The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-571-1 | xen security update |
Debian DSA |
DSA-3633-1 | xen security update |
EUVD |
EUVD-2016-5467 | The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:32:25.530Z
Reserved: 2016-05-03T00:00:00
Link: CVE-2016-4480
No data.
Status : Deferred
Published: 2016-05-18T14:59:05.413
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-4480
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD