Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen
4.1.x through 4.3.x, when using a multithreaded toolstack, does not
properly handle a failure by the xc_cpumap_alloc function, which
allows local users with access to management functions to cause a
denial of service (heap corruption) and possibly gain privileges via
Note:References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
MLIST:[oss-security] 20140212 Xen Security Advisory 88 (CVE-2014-1950) - use-after-free in xc_cpupool_getinfo() under memory pressure
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
This is an entry on the CVE
list, which standardizes names for security