CVE-2016-4480 in Xeninfo

Summary

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

Reservation

05/03/2016

Disclosure

05/18/2016

Entries

1

CPE

ready

CVSS

8.6

EPSS

0.00393

CTI

0.00

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!