First published: Fri Aug 29 2014(Updated: )
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.4.0 | |
Xen xen-unstable | =4.4.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5147 has a moderate severity level due to its potential to cause a denial of service by crashing the host system.
To fix CVE-2014-5147, upgrade to Xen version 4.4.1 or later where the vulnerability has been addressed.
CVE-2014-5147 affects users running Xen 4.4.0 and 4.4.0-rc1 with a 64-bit kernel on ARM systems.
CVE-2014-5147 can allow local guest users to crash the host system, leading to a denial of service.
Currently, the recommended action for CVE-2014-5147 is to apply the available patches or upgrade Xen to a secure version.