ghsa-gqm4-jx6m-62vq
Vulnerability from github
Published
2022-05-14 02:05
Modified
2022-05-14 02:05
Details
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
{ affected: [], aliases: [ "CVE-2014-8866", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2014-12-01T15:59:00Z", severity: "MODERATE", }, details: "The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.", id: "GHSA-gqm4-jx6m-62vq", modified: "2022-05-14T02:05:36Z", published: "2022-05-14T02:05:36Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-8866", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201504-04", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html", }, { type: "WEB", url: "http://secunia.com/advisories/59937", }, { type: "WEB", url: "http://secunia.com/advisories/62672", }, { type: "WEB", url: "http://support.citrix.com/article/CTX200288", }, { type: "WEB", url: "http://support.citrix.com/article/CTX201794", }, { type: "WEB", url: "http://www.debian.org/security/2015/dsa-3140", }, { type: "WEB", url: "http://www.securityfocus.com/bid/71332", }, { type: "WEB", url: "http://xenbits.xen.org/xsa/advisory-111.html", }, ], schema_version: "1.4.0", severity: [], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.