Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4480

Опубликовано: 17 мая 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1332657xen: x86 software guest page walk PS bit handling flaw (XSA-176)

EPSS

Процентиль: 66%
0.00516
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
nvd
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
debian
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6. ...

CVSS3: 8.4
github
больше 3 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 66%
0.00516
Низкий

4.3 Medium

CVSS2