First published: Fri May 22 2009(Updated: )
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.18 | |
Linux Linux kernel | =2.6.30-rc4 | |
Xen Xen | <=3.3.1 | |
Xen Xen | =2.0 | |
Xen Xen | =3.0.2 | |
Xen Xen | =3.0.3 | |
Xen Xen | =3.0.4 | |
Xen Xen | =3.1.2 | |
Xen Xen | =3.1.3 | |
Xen Xen | =3.1.4 | |
Xen Xen | =3.2 | |
Xen Xen | =3.2.0 | |
Xen Xen | =3.2.1 | |
Xen Xen | =3.2.2 | |
Xen Xen | =3.2.3 | |
Xen Xen | =3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.