CVE-2012-0029

NameCVE-2012-0029
DescriptionHeap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2396-1, DSA-2404-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xen (PTS)buster, buster (security)4.11.4+107-gef32c7afa2-1fixed
bullseye4.14.6-1fixed
bullseye (security)4.14.5+94-ge49571868d-1fixed
bookworm4.17.3+10-g091466ba55-1~deb12u1fixed
trixie4.17.3+10-g091466ba55-1fixed
sid4.17.3+36-g54dacb5c02-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qemu-kvmsourcesqueeze0.12.5+dfsg-5+squeeze8DSA-2396-1
qemu-kvmsource(unstable)1.0+dfsg-5
xensourcesqueeze(not affected)
xensource(unstable)4.1.3~rc1+hg-20120614.a9c0a89c08f2-1medium
xen-qemu-dm-4.0sourcesqueeze4.0.1-2+squeeze1DSA-2404-1
xen-qemu-dm-4.0source(unstable)(unfixed)

Notes

[squeeze] - xen <not-affected> (vulnerable code not present)

Search for package or bug name: Reporting problems