{
  "details" : [ "Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process." ],
  "statement" : "Not vulnerable. This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-5147\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-5147" ],
  "name" : "CVE-2014-5147",
  "csaw" : false
}