First published: Sun Oct 26 2014(Updated: )
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | =4.4.1 | |
Xen Xen | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.