First published: Fri May 22 2009(Updated: )
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.18 | |
Linux kernel | =2.6.30-rc4 | |
Xen xen-unstable | <=3.3.1 | |
Xen xen-unstable | =2.0 | |
Xen xen-unstable | =3.0.2 | |
Xen xen-unstable | =3.0.3 | |
Xen xen-unstable | =3.0.4 | |
Xen xen-unstable | =3.1.2 | |
Xen xen-unstable | =3.1.3 | |
Xen xen-unstable | =3.1.4 | |
Xen xen-unstable | =3.2 | |
Xen xen-unstable | =3.2.0 | |
Xen xen-unstable | =3.2.1 | |
Xen xen-unstable | =3.2.2 | |
Xen xen-unstable | =3.2.3 | |
Xen xen-unstable | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1758 has a medium severity as it allows guest user applications to cause a denial of service to the guest operating system.
To mitigate CVE-2009-1758, upgrade to a version of Xen that is higher than 3.3.1 and ensure the Linux kernel is updated to a version that does not contain this vulnerability.
CVE-2009-1758 affects versions of Xen up to and including 3.3.1.
Yes, CVE-2009-1758 can affect the Linux kernel versions 2.6.18 and 2.6.30-rc4, among others.
CVE-2009-1758 can be exploited by triggering a segmentation fault in certain address ranges, causing the guest OS to crash.