Unrated severityNVD Advisory· Published Dec 9, 2014· Updated May 6, 2026
CVE-2014-9066
CVE-2014-9066
Description
Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
Affected products
7- osv-coords4 versionspkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 4.4.1_10-9.1+ 3 more
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
- (no CPE)range: < 4.4.1_10-9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- xenbits.xen.org/xsa/advisory-114.htmlnvdPatchVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.htmlnvd
- www.openwall.com/lists/oss-security/2014/12/08/4nvd
- www.securityfocus.com/bid/71546nvd
- security.gentoo.org/glsa/201504-04nvd
News mentions
0No linked articles in our index yet.