CVE-2014-3717
Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0018 (0.2%)
Percentile: 39.6%
EPSS: 2026-05-06
Affects
xen:xenTechnical description
Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
Published: 5/19/2014, 2:55:12 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://www.openwall.com/lists/oss-security/2014/05/14/4
- http://www.openwall.com/lists/oss-security/2014/05/15/6
- http://www.openwall.com/lists/oss-security/2014/05/16/1
- http://www.securitytracker.com/id/1030252
- http://xenbits.xen.org/xsa/advisory-95.html
- http://www.openwall.com/lists/oss-security/2014/05/14/4
- http://www.openwall.com/lists/oss-security/2014/05/15/6
- http://www.openwall.com/lists/oss-security/2014/05/16/1