Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5147
Reference (s):
- http://xenbits.xen.org/xsa/advisory-102.html
- SECTRACK:1030724
- URL: http://www.securitytracker.com/id/1030724

