Buffer overflow in the macvtap device driver in the Linux kernel before 3.4.5, when running in certain configurations, allows privileged KVM guest users to cause a denial of service (crash) via a long descriptor with a long vector length.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 | x_refsource_CONFIRM |
| http://rhn.redhat.com/errata/RHSA-2012-0743.html | vendor-advisory x_refsource_REDHAT |
| https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73 | x_refsource_CONFIRM |
| http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73 | x_refsource_CONFIRM |
| http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278 | x_refsource_CONFIRM |
| http://marc.info/?l=linux-netdev&m=133455718001608&w=2 | mailing-list x_refsource_MLIST |
| http://ubuntu.com/usn/usn-1529-1 | vendor-advisory x_refsource_UBUNTU |
| http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html | vendor-advisory x_refsource_SUSE |
| https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2012/04/19/14 | mailing-list x_refsource_MLIST |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|