5
CVSSv2

CVE-2009-1758

Published: 22/05/2009 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The hypervisor_callback function in Xen, possibly prior to 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.3.0

xen xen 3.2.3

xen xen 2.0

xen xen 3.2.2

xen xen 3.2.0

xen xen 3.1.4

xen xen 3.1.2

xen xen

xen xen 3.0.3

xen xen 3.0.2

xen xen 3.2.1

xen xen 3.2

xen xen 3.1.3

xen xen 3.0.4

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and several bugsare now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Secur ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and various bugsare now available for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Secur ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1630 Frank Filz discovered that local users may be able to execute files without execute permission when accessed via an ...