Bug 816151 (CVE-2012-2137) - CVE-2012-2137 kernel: kvm: buffer overflow in kvm_set_irq()
Summary: CVE-2012-2137 kernel: kvm: buffer overflow in kvm_set_irq()
Status: CLOSED ERRATA
Alias: CVE-2012-2137
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20120605,repo...
Keywords: Security
Depends On: 816154 816155
Blocks: 816157
TreeView+ depends on / blocked
 
Reported: 2012-04-25 11:07 UTC by Petr Matousek
Modified: 2015-02-16 15:50 UTC (History)
15 users (show)

(edit)
Clone Of:
(edit)
Last Closed: 2013-08-24 12:17:30 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0743 normal SHIPPED_LIVE Important: kernel security and bug fix update 2012-06-18 17:32:36 UTC

Description Petr Matousek 2012-04-25 11:07:14 UTC
kvm_set_irq() has an internal buffer of three irq routing entries, allowing connecting a GSI to three IRQ chips or on MSI.  However setup_routing_entry() does not properly enforce this, allowing three irqchip routes followed by an MSI route to overflow the buffer.

An unprivileged local user could use this flaw to crash the system or potentialy escalate their privileges.

Comment 7 Petr Matousek 2012-06-05 18:04:05 UTC
Statement:

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG. This issue was addressed in Red Hat Enterprise Linux 6 via RHSA-2012:0743 https://rhn.redhat.com/errata/RHSA-2012-0743.html

Comment 8 errata-xmlrpc 2012-06-18 13:34:32 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0743 https://rhn.redhat.com/errata/RHSA-2012-0743.html


Note You need to log in before you can comment on or make changes to this bug.