Upstream information
Description
The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Note from the SUSE Security Team on the xen package
This issue likely only affects the XEN hypervisor itself, unless otherwise stated. The userland utilities in -tools and libraries in -libs are shipped together with the xen hypervisor as they are built from one source and do not contain hypervisor specific fixes.SUSE Bugzilla entry: 503457 [CLOSED / FIXED]
SUSE Security Advisories:
- SUSE-SA:2009:045, published Thu, 20 Aug 2009 13:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:36:49 2013CVE page last modified: Mon Mar 17 16:16:28 2025