The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/35093 | third party advisory |
http://www.openwall.com/lists/oss-security/2009/05/14/2 | mailing list |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10313 | signature vdb entry |
http://secunia.com/advisories/35298 | third party advisory |
http://www.securityfocus.com/bid/34957 | vdb entry |
http://lists.xensource.com/archives/html/xen-devel/2009-05/msg00561.html | exploit mailing list |
http://www.debian.org/security/2009/dsa-1809 | vendor advisory |