Affected configuration(s):
cpe:/o:xen:xen:4.4.0:-
cpe:/o:xen:xen:4.4.0:rc1
Date published: 2014-05-19T10:55:12.563-04:00
Date last modified: 2016-10-19T12:45:56.793-04:00
CVSS Score: 3.3
Principal attack vector: LOCAL
Complexity: MEDIUM
Reference URL: http://www.openwall.com/lists/oss-security/2014/05/14/4
Summary: Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.