CVE Vulnerabilities

CVE-2016-4480

Published: May 18, 2016 | Modified: Apr 12, 2025
CVSS 3.x
8.4
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
4.3 MODERATE
AV:A/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

Affected Software

NameVendorStart VersionEnd Version
Vm_serverOracle3.2 (including)3.2 (including)
Vm_serverOracle3.3 (including)3.3 (including)
Vm_serverOracle3.4 (including)3.4 (including)
Linux-floUbuntutrusty*
Linux-goldfishUbuntutrusty*
Linux-grouperUbuntutrusty*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-vexpressUbuntuprecise*
Linux-lts-quantalUbuntuprecise*
Linux-lts-raringUbuntuprecise*
Linux-lts-saucyUbuntuprecise*
Linux-maguroUbuntutrusty*
Linux-makoUbuntutrusty*
Linux-mantaUbuntutrusty*
Linux-qcm-msmUbuntuprecise*
XenUbuntudevel*
XenUbuntuesm-infra/xenial*
XenUbuntuprecise*
XenUbuntutrusty*
XenUbuntuwily*
XenUbuntuxenial*

References