The Xen package is vulnerable to Buffer Overflows. A malicious local administrator of a guest domain could potentially trigger this flaw and execute arbitrary code outside of the domain.
lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
osvdb.org/35494
secunia.com/advisories/25073
secunia.com/advisories/25095
secunia.com/advisories/27047
secunia.com/advisories/27085
secunia.com/advisories/27103
secunia.com/advisories/27486
secunia.com/advisories/29129
secunia.com/advisories/30413
secunia.com/advisories/33568
taviso.decsystem.org/virtsec.pdf
www.debian.org/security/2007/dsa-1284
www.debian.org/security/2007/dsa-1384
www.mandriva.com/security/advisories?name=MDKSA-2007:203
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2007-0323.html
www.securityfocus.com/bid/23731
www.vupen.com/english/advisories/2007/1597
access.redhat.com/errata/RHSA-2007:0323
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315
www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html
www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html