First published: Wed Apr 25 2012(Updated: )
Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.33<3.0.72 | |
Linux Kernel | >=3.1<3.2.24 | |
Linux Kernel | >=3.3<3.4.81 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2137 has been categorized as a high severity vulnerability due to its potential to cause denial of service and may allow arbitrary code execution.
To fix CVE-2012-2137, update your Linux kernel to version 3.2.25 or higher, or apply the relevant patches if using affected distributions.
CVE-2012-2137 affects Linux kernel versions prior to 3.2.25, including specific Ubuntu releases like 10.04, 11.10, and 12.04.
Exploitation of CVE-2012-2137 can lead to system crashes and potentially allow attackers to execute arbitrary code with elevated privileges.
CVE-2012-2137 is primarily a local vulnerability, meaning it requires local access to the system to be exploited.