CVE-2012-3495
Publication date 23 November 2012
Last updated 24 July 2024
Ubuntu priority
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
Status
Package | Ubuntu Release | Status |
---|---|---|
xen | 12.10 quantal |
Not affected
|
12.04 LTS precise |
Fixed 4.1.2-2ubuntu2.4
|
|
11.10 oneiric |
Fixed 4.1.1-2ubuntu4.4
|
|
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
xen-3.1 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Not affected
|
|
xen-3.2 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy |
Not affected
|
|
xen-3.3 | 12.10 quantal | Not in release |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
11.04 natty |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
8.04 LTS hardy | Not in release |