The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2012-11-23T20:00:00

Updated: 2024-08-06T20:05:12.705Z

Reserved: 2012-06-14T00:00:00

Link: CVE-2012-3495

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2012-11-23T20:55:03.150

Modified: 2024-11-21T01:40:59.690

Link: CVE-2012-3495

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-09-05T00:00:00Z

Links: CVE-2012-3495 - Bugzilla