The hypervisor_callback function in Xen, possibly before 3.4.0, as
applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other
versions allows guest user applications to cause a denial of service
(kernel oops) of the guest OS by triggering a segmentation fault in
"certain address ranges."
I'm not sure about the category, xen herd, please correct me if needed...
Whiteboard taken from CVE description.
([xen >=2.6] does not make sense)
3.4.1 is in tree
looks like xen-sources is the affected piece of software,
not the xen hypervisor (from app-emulation/xen)?!
Which kernel version is affected ?
Xen 4.1 in tree. Please test with it and reopen if it doesnt work
Only security closes security bugs. Thanks.
And security is closing the bug now.