{"id":"CVE-2014-1950","details":"Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.","modified":"2026-01-27T04:12:34.279494Z","published":"2014-02-14T15:55:06Z","withdrawn":"2026-01-27T04:12:34.279494Z","references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-3006"},{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-88.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/02/12/17"}],"schema_version":"1.7.3"}