CVE-2012-0879
Publication date 23 February 2012
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
From the Ubuntu Security Team
Louis Rilling discovered a flaw in Linux kernel’s clone command when CLONE_IO is specified. An unprivileged local user could exploit this to cause a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 13.04 raring |
Not affected
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
11.04 natty |
Not affected
|
|
10.10 maverick | Ignored end of life, was pending | |
10.04 LTS lucid |
Fixed 2.6.32-40.87
|
|
8.04 LTS hardy |
Not affected
|
|
linux-armadaxp | 13.04 raring | Not in release |
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
linux-ec2 | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid |
Fixed 2.6.32-344.46
|
|
8.04 LTS hardy | Not in release | |
linux-fsl-imx51 | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Fixed 2.6.31-612.34
|
|
8.04 LTS hardy | Not in release | |
linux-lts-backport-maverick | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Not in release | |
linux-lts-backport-natty | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
linux-lts-backport-oneiric | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Not in release | |
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
linux-lts-quantal | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise |
Not affected
|
|
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
linux-lts-raring | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise |
Not affected
|
|
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
linux-mvl-dove | 13.04 raring | Not in release |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.10 maverick | Ignored end of life, was pending | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Not in release | |
linux-ti-omap4 | 13.04 raring |
Not affected
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
11.04 natty |
Not affected
|
|
10.10 maverick | Ignored end of life, was pending | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
linux |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-1410-1
- Linux kernel (EC2) vulnerability
- 27 March 2012
- USN-1411-1
- Linux kernel vulnerability
- 27 March 2012
- USN-1408-1
- Linux kernel (FSL-IMX51) vulnerability
- 27 March 2012