// For flags

CVE-2012-2373

kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition

Severity Score

4.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.

El kernel de Linux anterior a v3.4.5 en la plataforma x86, cuando Physical Address Extension (PAE) está activada, no utiliza correctamente Page Middle Directory (PMD), permitiendo a usuarios locales causar una denegación de servicio a través de una aplicación especialmente diseñada que lanza una condición de carrera

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-04-19 CVE Reserved
  • 2012-06-18 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
<= 3.4.4
Search vendor "Linux" for product "Linux Kernel" and version " <= 3.4.4"
x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc1, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc2, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc3, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc4, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc5, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc6, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4
Search vendor "Linux" for product "Linux Kernel" and version "3.4"
rc7, x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4.1
Search vendor "Linux" for product "Linux Kernel" and version "3.4.1"
x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4.2
Search vendor "Linux" for product "Linux Kernel" and version "3.4.2"
x86
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
3.4.3
Search vendor "Linux" for product "Linux Kernel" and version "3.4.3"
x86
Affected