CVE-2012-1179
kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Linux kernel before 3.3.1, when KVM is used, allows guest OS users to cause a denial of service (host OS crash) by leveraging administrative access to the guest OS, related to the pmd_none_or_clear_bad function and page faults for huge pages.
El kernel de Linux en versiones anteriores a la v3.3.1, cuando se utiliza KVM, permite causar una denegación de servicio (caída del sistema operativo 'Host') a los usuarios de un sistema operativo invitado, aprovechando el acceso administrativo al sistema operativo invitado. Se trata de una vulnerabilidad relacionada con la función pmd_none_or_clear_bad y un fallo de página en páginas grandes.
The kernel packages contain the Linux kernel, the core of any Linux operating system. A local, unprivileged user could use an integer overflow flaw in drm_mode_dirtyfb_ioctl() to cause a denial of service or escalate their privileges. A buffer overflow flaw was found in the macvtap device driver, used for creating a bridged network between the guest and the host in KVM environments. A privileged guest user in a KVM guest could use this flaw to crash the host. Note: This issue only affected hosts that have the vhost_net module loaded with the experimental_zcopytx module option enabled, and that also have macvtap configured for at least one guest.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-02-14 CVE Reserved
- 2012-04-23 CVE Published
- 2024-08-06 CVE Updated
- 2025-05-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/48404 | Third Party Advisory | |
http://secunia.com/advisories/48898 | Third Party Advisory | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.1 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2012/03/15/7 | Mailing List |
|
http://www.securitytracker.com/id?1027084 | Vdb Entry | |
https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 3.3 Search vendor "Linux" for product "Linux Kernel" and version " <= 3.3" | rc7 |
Affected
|