CVE-2012-0029
Publication date 23 January 2012
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Status
Package | Ubuntu Release | Status |
---|---|---|
kvm | 11.10 oneiric | Not in release |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
qemu | 11.10 oneiric | Not in release |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
qemu-kvm | 11.10 oneiric |
Fixed 0.14.1+noroms-0ubuntu6.2
|
11.04 natty |
Fixed 0.14.0+noroms-0ubuntu4.5
|
|
10.10 maverick |
Fixed 0.12.5+noroms-0ubuntu7.11
|
|
10.04 LTS lucid |
Fixed 0.12.3+noroms-0ubuntu9.17
|
|
8.04 LTS hardy | Not in release |
References
Related Ubuntu Security Notices (USN)
- USN-1339-1
- QEMU vulnerability
- 23 January 2012