Unrated severityNVD Advisory· Published Dec 9, 2014· Updated May 6, 2026
CVE-2014-9065
CVE-2014-9065
Description
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
Affected products
7- osv-coords4 versionspkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 4.4.1_10-9.1+ 3 more
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- xenbits.xen.org/xsa/advisory-114.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.htmlnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/12/08/4nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/71544nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201504-04nvdThird Party Advisory
News mentions
0No linked articles in our index yet.