CVE-2014-5147

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-5147
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-5147.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-5147
Related
Published
2014-08-29T16:55:11Z
Modified
2024-11-21T02:11:30Z
Summary
[none]
Details

Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.

References

Affected packages

Debian:11 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xen

Package

Name
xen
Purl
pkg:deb/debian/xen?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}