Description
The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2668-1 | linux-2.6 security update |
EUVD |
EUVD-2012-2123 | The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices. |
Ubuntu USN |
USN-1457-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1470-1 | Linux kernel (Natty backport) vulnerabilities |
Ubuntu USN |
USN-1471-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1472-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1473-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1474-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1476-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1577-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2036-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2037-1 | Linux kernel (EC2) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:26:08.276Z
Reserved: 2012-04-04T00:00:00.000Z
Link: CVE-2012-2121
No data.
Status : Modified
Published: 2012-05-17T11:00:38.210
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-2121
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN