The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2012-11-23T20:00:00
Updated: 2017-06-30T16:57:01
Reserved: 2012-06-14T00:00:00
Link: CVE-2012-3495
JSON object: View
NVD Information
Status : Modified
Published: 2012-11-23T20:55:03.150
Modified: 2017-07-01T01:29:02.140
Link: CVE-2012-3495
JSON object: View
Redhat Information
No data.
CWE