First published: Thu Mar 15 2012(Updated: )
In some cases it may happen that pmd_none_or_clear_bad() is called with the mmap_sem hold in read mode. In those cases the huge page faults can allocate hugepmds under pmd_none_or_clear_bad() and that can trigger a false positive from pmd_bad() that will not like to see a pmd materializing as trans huge. A privileged user in the KVM guest can use this flaw to crash the host. An unprivileged local user could use this flaw to crash the system. Proposed upstream patch: <a href="http://comments.gmane.org/gmane.linux.kernel.mm/75413">http://comments.gmane.org/gmane.linux.kernel.mm/75413</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <=3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1179 has a severity rating that indicates it can potentially lead to denial of service conditions under specific circumstances.
To fix CVE-2012-1179, it is recommended to update to a patched version of the Linux kernel that is above 3.3.
CVE-2012-1179 affects Linux kernel versions up to and including 3.3.
CVE-2012-1179 may cause system instability leading to potential hangs or crashes during memory allocation.
CVE-2012-1179 is not typically exploitable remotely; it generally requires local access to the system.