{"id":"CVE-2014-5147","details":"Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.","modified":"2026-04-10T03:43:55.336741Z","published":"2014-08-29T16:55:11Z","references":[{"type":"ADVISORY","url":"http://xenbits.xen.org/xsa/advisory-102.html"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-102.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1030724"}],"schema_version":"1.7.5"}