CVE-2012-3495
23.11.2012, 20:55
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
citrix | xenserver | 𝑥 ≤ 6.0.2 |
citrix | xenserver | 5.0 |
citrix | xenserver | 5.5 |
citrix | xenserver | 5.6 |
citrix | xenserver | 5.6:fp1 |
citrix | xenserver | 5.6:sp2 |
citrix | xenserver | 6.0 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
xen |
| ||||||||||||
xen-3.1 |
| ||||||||||||
xen-3.2 |
| ||||||||||||
xen-3.3 |
|
Common Weakness Enumeration