CVE-2012-1601
kernel: kvm: irqchip_in_kernel() and vcpu->arch.apic inconsistency
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
La implementación KVM en el núcleo de Linux anterior a la versión V3.3.6 permite a los usuarios del sistema operativo causar una denegación de servicio (puntero NULL a referencia eliminada y caída del sistema operativo del host) al hacer una llamada ioctl KVM_CREATE_IRQCHIP sobre una CPU virtual que ya existe.
KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel. A flaw was found in the way the KVM_CREATE_IRQCHIP ioctl was handled. Calling this ioctl when at least one virtual CPU already existed could lead to a NULL pointer dereference later when the VCPU is scheduled to run. A malicious user in the kvm group on the host could use this flaw to crash the host. A flaw was found in the way device memory was handled during guest device removal. Upon successful device removal, memory used by the device was not properly unmapped from the corresponding IOMMU or properly released from the kernel, leading to a memory leak. A malicious user in the kvm group on the host who has the ability to assign a device to a guest could use this flaw to crash the host.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-03-12 CVE Reserved
- 2012-05-11 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/49928 | Third Party Advisory | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2012/03/30/1 | Mailing List |
|
http://www.securitytracker.com/id?1026897 | Vdb Entry | |
https://github.com/torvalds/linux/commit/9c895160d25a76c21b65bad141b08e8d4f99afef | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 3.3.5 Search vendor "Linux" for product "Linux Kernel" and version " <= 3.3.5" | - |
Affected
|