First published: Fri May 02 2014(Updated: )
Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3125 is classified as a denial of service vulnerability.
To fix CVE-2014-3125, upgrade to a version of Xen that has addressed the vulnerability.
CVE-2014-3125 affects users running Xen 4.4.0 and 4.4.0-rc1 on ARM systems.
CVE-2014-3125 can be exploited by local guest users to cause a denial of service attack resulting in a crash.
Yes, CVE-2014-3125 is specific to Xen running on ARM architecture.