The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
2009-05-22T11:52:40.627
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | 2.6.18 | No |
Operating System | linux | linux_kernel | 2.6.30 | No |
Application | xen | xen | ≤ 3.3.1 | Yes |
Application | xen | xen | 2.0 | Yes |
Application | xen | xen | 3.0.2 | Yes |
Application | xen | xen | 3.0.3 | Yes |
Application | xen | xen | 3.0.4 | Yes |
Application | xen | xen | 3.1.2 | Yes |
Application | xen | xen | 3.1.3 | Yes |
Application | xen | xen | 3.1.4 | Yes |
Application | xen | xen | 3.2 | Yes |
Application | xen | xen | 3.2.0 | Yes |
Application | xen | xen | 3.2.1 | Yes |
Application | xen | xen | 3.2.2 | Yes |
Application | xen | xen | 3.2.3 | Yes |
Application | xen | xen | 3.3.0 | Yes |