From ${URL} : Description A weakness has been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). The weakness is caused due to an error within "xen_iret()" when handling an IRET (Interrupt Return) and can be exploited to cause a crash. Successful exploitation requires that a 32-bit ParaVirtual OPerationS (PVOPS) guest is used. Solution Apply patch xsa42-pvops-0001-x86-xen-don-t-assume-ds-is-usable-in-xen_iret-for-32.patch Provided and/or discovered by Drew Jones Original Advisory XSA-42: http://www.openwall.com/lists/oss-security/2013/02/13/10
Take a look also at xsa-38 http://www.openwall.com/lists/oss-security/2013/02/15/5
(In reply to comment #1) > Take a look also at xsa-38 > http://www.openwall.com/lists/oss-security/2013/02/15/5 Nevermind about this comment. The original issue for this bug regards the kernel instead of app-emulation/xen
There are no longer any 2.x or <3.7.9 kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security.