CVE-2014-3714

Publication date 19 May 2014

Last updated 24 July 2024


Ubuntu priority

The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer overflow.

Read the notes from the security team

Status

Package Ubuntu Release Status
xen 14.04 LTS trusty
Fixed 4.4.0-0ubuntu5.1
13.10 saucy
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Not affected
10.04 LTS lucid Not in release
xen-3.3 14.04 LTS trusty Not in release
13.10 saucy Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid
Not affected

Notes


mdeslaur

32- and 64-bit ARM systems only, 4.4.x only