CVE-2012-2137

Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0743.html Third Party Advisory
http://secunia.com/advisories/50952 Broken Link
http://secunia.com/advisories/50961 Broken Link
http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html Third Party Advisory
http://ubuntu.com/usn/usn-1529-1 Third Party Advisory
http://ubuntu.com/usn/usn-1607-1 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 Vendor Advisory
http://www.securityfocus.com/bid/54063 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1594-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-1606-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-1609-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=816151 Issue Tracking Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0743.html Third Party Advisory
http://secunia.com/advisories/50952 Broken Link
http://secunia.com/advisories/50961 Broken Link
http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html Third Party Advisory
http://ubuntu.com/usn/usn-1529-1 Third Party Advisory
http://ubuntu.com/usn/usn-1607-1 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 Vendor Advisory
http://www.securityfocus.com/bid/54063 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1594-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-1606-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-1609-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=816151 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed - Vendor Advisory () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html - Mailing List, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory
References () http://secunia.com/advisories/50952 - Broken Link () http://secunia.com/advisories/50952 - Broken Link
References () http://secunia.com/advisories/50961 - Broken Link () http://secunia.com/advisories/50961 - Broken Link
References () http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html - Third Party Advisory () http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html - Third Party Advisory
References () http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory
References () http://ubuntu.com/usn/usn-1607-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1607-1 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - Vendor Advisory
References () http://www.securityfocus.com/bid/54063 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/54063 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1594-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1594-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-1606-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1606-1 - Third Party Advisory
References () http://www.ubuntu.com/usn/USN-1609-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1609-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=816151 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=816151 - Issue Tracking, Third Party Advisory

11 Aug 2023, 18:44

Type Values Removed Values Added
References (UBUNTU) http://www.ubuntu.com/usn/USN-1594-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1594-1 - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1609-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1609-1 - Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=816151 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=816151 - Issue Tracking, Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0743.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24 - Vendor Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1606-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1606-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/50952 - (SECUNIA) http://secunia.com/advisories/50952 - Broken Link
References (MISC) http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html - (MISC) http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/50961 - (SECUNIA) http://secunia.com/advisories/50961 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html - Mailing List, Third Party Advisory
References (UBUNTU) http://ubuntu.com/usn/usn-1607-1 - (UBUNTU) http://ubuntu.com/usn/usn-1607-1 - Third Party Advisory
References (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed - (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed - Vendor Advisory
References (HP) http://marc.info/?l=bugtraq&m=139447903326211&w=2 - (HP) http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/54063 - (BID) http://www.securityfocus.com/bid/54063 - Third Party Advisory, VDB Entry
References (UBUNTU) http://ubuntu.com/usn/usn-1529-1 - (UBUNTU) http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
First Time Canonical ubuntu Linux
Canonical

Information

Published : 2013-01-22 23:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2137

Mitre link : CVE-2012-2137

CVE.ORG link : CVE-2012-2137


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer