AI Score
Confidence
High
EPSS
Percentile
5.1%
Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.
www.openwall.com/lists/oss-security/2014/05/14/4
www.openwall.com/lists/oss-security/2014/05/15/6
www.openwall.com/lists/oss-security/2014/05/16/1
www.securitytracker.com/id/1030252
xenbits.xen.org/xsa/advisory-95.html