A change to an internal interface within the hypervisor invalidated an
ASSERT in a caller of that API. This code path is exposed to PV guests
via a hypercall allowing administrators of PV guests to crash the
hypervisor if it is built with debugging enabled.
Malicious administrators of PV guests running on hypervisors built
with the non-default debug=y option can crash the host.
References:
http://seclists.org/oss-sec/2013/q1/17
Acknowledgements:
Red Hat would like to thank the Xen project for reporting this issue.
Statement:
Not vulnerable.
This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.
This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.