Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/59934 - | |
References | () http://www.securityfocus.com/bid/69189 - | |
References | () http://www.securitytracker.com/id/1030725 - | |
References | () http://xenbits.xenproject.org/xsa/advisory-103.html - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/95233 - |
Information
Published : 2014-10-26 20:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5148
Mitre link : CVE-2014-5148
CVE.ORG link : CVE-2014-5148
JSON object : View
Products Affected
xen
- xen
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer