First published: Mon May 19 2014(Updated: )
Xen 4.4.x does not properly check alignment, which allows local users to cause a denial of service (crash) via an unspecified field in a DTB header in a 32-bit guest kernel.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3716 has a severity rating that indicates it can cause a denial of service in a 32-bit guest kernel.
To fix CVE-2014-3716, upgrade to a version of Xen that is not affected, specifically versions beyond 4.4.x.
CVE-2014-3716 affects local users running 32-bit guest kernels on Xen 4.4.x.
CVE-2014-3716 exploits improper alignment checks in the DTB header.
CVE-2014-3716 cannot be exploited remotely as it requires local user access to the affected system.