Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
Loading...
Loading...
Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
May 19, 2014
May 6, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2014-3717
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.