{"id":"CVE-2018-14678","details":"An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.","modified":"2026-03-15T22:19:10.431824Z","published":"2018-07-28T18:29:00.243Z","related":["MGASA-2018-0337","MGASA-2018-0340","MGASA-2018-0341","SUSE-SU-2018:3084-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3931-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3931-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4308"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104924"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041397"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html"},{"type":"FIX","url":"https://xenbits.xen.org/xsa/advisory-274.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.14.21"},{"fixed":"4.14.61"}]},{"events":[{"introduced":"4.15.5"},{"fixed":"4.17.13"}]},{"events":[{"introduced":"0"},{"last_affected":"4.11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14678.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}