Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
11 Aug 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MISC) http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/50961 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/50952 - Broken Link | |
References | (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - Vendor Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1609-1 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/54063 - Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html - Mailing List, Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=816151 - Issue Tracking, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1606-1 - Third Party Advisory | |
References | (UBUNTU) http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1594-1 - Third Party Advisory | |
References | (UBUNTU) http://ubuntu.com/usn/usn-1607-1 - Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
Information
Published : 2013-01-22 23:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-2137
Mitre link : CVE-2012-2137
CVE.ORG link : CVE-2012-2137
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer