CVE-2012-3495
Published: 23 November 2012
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.1.3-2)
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
mdeslaur | This is XSA-13 only affects 4.1 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
- http://seclists.org/oss-sec/2012/q3/377
- NVD
- Launchpad
- Debian