CVE-2014-1950Use After Free in XEN

Severity
4.6MEDIUMNVD
EPSS
0.1%
top 75.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 14
Latest updateMay 17

Description

Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages3 packages

debiandebian/xen< xen 4.4.0-1 (bookworm)
Debianxen/xen< 4.4.0-1+3
NVDxen/xen12 versions+11

🔴Vulnerability Details

2
GHSA
GHSA-98mj-mwpf-cj8q: Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 42022-05-17
OSV
CVE-2014-1950: Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 42014-02-14

📋Vendor Advisories

2
Red Hat
xen: use-after-free in xc_cpupool_getinfo() under memory pressure (XSA-88)2014-02-12
Debian
CVE-2014-1950: xen - Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x thr...2014

💬Community

2
Bugzilla
CVE-2014-1950 xen: use-after-free in xc_cpupool_getinfo() under memory pressure (XSA-88) [fedora-all]2014-02-12
Bugzilla
CVE-2014-1950 xen: use-after-free in xc_cpupool_getinfo() under memory pressure (XSA-88)2014-02-12