Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/67157 | vdb entry |
http://xenbits.xen.org/xsa/advisory-91.html | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2014/04/30/5 | mailing list |
http://www.securitytracker.com/id/1030184 | vdb entry |
http://www.openwall.com/lists/oss-security/2014/04/30/11 | mailing list |
http://secunia.com/advisories/58347 | third party advisory vendor advisory |