Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-2119

Publication date 19 April 2012

Last updated 24 July 2024


Ubuntu priority

Buffer overflow in the macvtap device driver in the Linux kernel before 3.4.5, when running in certain configurations, allows privileged KVM guest users to cause a denial of service (crash) via a long descriptor with a long vector length.

From the Ubuntu Security Team

A flaw was discovered in the Linux kernel's macvtap device driver, which is used in KVM (Kernel-based Virtual Machine) to create a network bridge between host and guest. A privleged user in a guest could exploit this flaw to crash the host, if the vhost_net module is loaded with the experimental_zcopytx option enabled.

Read the notes from the security team

Status

Package Ubuntu Release Status
linux 12.04 LTS precise
Not affected
11.10 oneiric
Not affected
11.04 natty
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected
linux-armadaxp 12.04 LTS precise
Fixed 3.2.0-1606.9
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release
linux-ec2 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-fsl-imx51 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-lts-backport-maverick 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Not in release
linux-lts-backport-natty 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-lts-backport-oneiric 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid
Not affected
8.04 LTS hardy Not in release
linux-mvl-dove 12.04 LTS precise Not in release
11.10 oneiric Not in release
11.04 natty Not in release
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Not in release
linux-ti-omap4 12.04 LTS precise
Not affected
11.10 oneiric
Not affected
11.04 natty
Not affected
10.04 LTS lucid Not in release
8.04 LTS hardy Not in release

Notes


apw

email thread discussing the patch does not conclude on a patch as yet nothing obviously matching it has hit mainline yet a second patch set was pushed under the thread below and appears to be making its way into v3.5 http://www.spinics.net/lists/netdev/msg197132.html Patch set seems to have hit ending at the sha1 below, it is possible we need all four patches: b92946e2919134ebe2a4083e4302236295ea2a73

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux

References

Related Ubuntu Security Notices (USN)

    • USN-1529-1
    • Linux kernel vulnerabilities
    • 10 August 2012
    • USN-1514-1
    • Linux kernel (OMAP4) vulnerabilities
    • 10 August 2012

Other references