Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2014-05-19T14:00:00
Updated: 2024-08-06T10:50:18.330Z
Reserved: 2014-05-14T00:00:00
Link: CVE-2014-3717
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-05-19T14:55:12.563
Modified: 2024-11-21T02:08:44.180
Link: CVE-2014-3717
Redhat
No data.