CVE-2009-1758
Published May 22, 2009
Last updated 7 years ago
Overview
- Description
- The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Vendor comments
- Red HatThis issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG. It was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2009-1132.html and https://rhn.redhat.com/errata/RHSA-2009-1106.html .
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:x86_32:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2B1B229-B325-4D8C-B326-1FF6D85891F5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc4:x86_32:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "06EFB3F7-2EAE-4A56-A9A1-E8C734E6B91E" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:xen:xen:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07CFE66F-0105-42D4-80D5-427977D8757A", "versionEndIncluding": "3.3.1" }, { "criteria": "cpe:2.3:a:xen:xen:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1A61248-160C-42F4-A803-20948FEA72CE" }, { "criteria": "cpe:2.3:a:xen:xen:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE0D9D45-1F2E-4236-858B-BBA54B17C8F5" }, { "criteria": "cpe:2.3:a:xen:xen:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AFDE72E-1997-48BA-A065-E0DD4ABE6E38" }, { "criteria": "cpe:2.3:a:xen:xen:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5E1D892-3A6C-4CC4-8237-231E593884EE" }, { "criteria": "cpe:2.3:a:xen:xen:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3C0C052-D6BA-4BC8-A64B-1A90CA572186" }, { "criteria": "cpe:2.3:a:xen:xen:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54C61369-9EED-45CD-943C-DF26E818F09A" }, { "criteria": "cpe:2.3:a:xen:xen:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D791DFF8-173B-49DB-AA8C-C1BBB8DB3611" }, { "criteria": "cpe:2.3:a:xen:xen:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26281E48-3854-4C4B-8F71-2C2ED207F19C" }, { "criteria": "cpe:2.3:a:xen:xen:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B242BA78-F752-414B-8DB9-D24E241EAE94" }, { "criteria": "cpe:2.3:a:xen:xen:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "717A9642-5033-47B1-B795-5676E950286B" }, { "criteria": "cpe:2.3:a:xen:xen:3.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0E18B3B-B562-49DF-AA75-13445B54CD1A" }, { "criteria": "cpe:2.3:a:xen:xen:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A9504C4-8826-40D8-823C-8E42F2453B9F" }, { "criteria": "cpe:2.3:a:xen:xen:3.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92646AED-BF1E-4471-96A0-1926932AF4C8" } ], "operator": "OR" } ], "operator": "AND" } ]