CVE-2014-3125XEN vulnerability

CWE-26412 documents6 sources
Severity
6.2MEDIUMNVD
EPSS
0.3%
top 46.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 2
Latest updateMay 14

Description

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

CVSS vector

AV:A/AC:L/C:N/I:P/A:CExploitability: 5.1 | Impact: 7.8

Affected Packages3 packages

Ubuntuxen/xen< 4.4.0-0ubuntu5.1
NVDxen/xen4.4.0
debiandebian/xen

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r57q-666q-xr8j: Xen 42022-05-14
OSV
CVE-2014-3125: Xen 42014-05-02

📋Vendor Advisories

7
Red Hat
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08
Red Hat
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08
Red Hat
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08
Red Hat
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08
Red Hat
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08

💬Community

2
Bugzilla
flash-plugin: information disclosure issues fixed in APSB15-162015-07-08
Bugzilla
CVE-2014-3125 xen: arm: Hardware timer context is not properly context switched (xsa-91)2014-04-16