The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2668-1 | linux-2.6 security update |
EUVD |
EUVD-2012-2123 | The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices. |
Ubuntu USN |
USN-1457-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1470-1 | Linux kernel (Natty backport) vulnerabilities |
Ubuntu USN |
USN-1471-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1472-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1473-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1474-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1476-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1577-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2036-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2037-1 | Linux kernel (EC2) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:26:08.276Z
Reserved: 2012-04-04T00:00:00.000Z
Link: CVE-2012-2121
No data.
Status : Deferred
Published: 2012-05-17T11:00:38.210
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-2121
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN