The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-571-1 | xen security update |
![]() |
DSA-3633-1 | xen security update |
![]() |
EUVD-2016-5467 | The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:32:25.530Z
Reserved: 2016-05-03T00:00:00
Link: CVE-2016-4480

No data.

Status : Deferred
Published: 2016-05-18T14:59:05.413
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-4480


No data.