Description
The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2469-1 | linux-2.6 security update |
EUVD |
EUVD-2012-1615 | The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists. |
Ubuntu USN |
USN-1445-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1448-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1452-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1453-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-1455-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1457-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1459-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1460-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1470-1 | Linux kernel (Natty backport) vulnerabilities |
Ubuntu USN |
USN-1507-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:01:02.571Z
Reserved: 2012-03-12T00:00:00.000Z
Link: CVE-2012-1601
No data.
Status : Modified
Published: 2012-05-17T11:00:37.757
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-1601
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN