First published: Mon May 19 2014(Updated: )
The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3714 is classified as a medium severity vulnerability due to the potential for denial of service and unauthorized memory access.
To fix CVE-2014-3714, upgrade to a patched version of Xen beyond 4.4.x that addresses the kernel length validation issue.
CVE-2014-3714 can be exploited through crafted 32-bit ARM guest kernel images, leading to memory reading or system crashes.
CVE-2014-3714 affects Xen version 4.4.0 and 4.4.0-rc1.
Local users who have access to run 32-bit ARM guest kernels in affected Xen environments are at risk from CVE-2014-3714.