CVE-2014-5148Improper Restriction of Operations within the Bounds of a Memory Buffer in XEN

Severity
4.6MEDIUMNVD
EPSS
0.2%
top 63.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 26
Latest updateMay 17

Description

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages3 packages

debiandebian/xen< xen 4.4.1-1 (bookworm)
Debianxen/xen< 4.4.1-1+3
NVDxen/xen4.4.0, 4.4.1+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-35mg-4h75-f9m6: Xen 42022-05-17
OSV
CVE-2014-5148: Xen 42014-10-26

📋Vendor Advisories

2
Debian
CVE-2014-5148: xen - Xen 4.4.x, when running on an ARM system and "handling an unknown system registe...2014
Red Hat
CVE-2014-5148: Xen 4