CVE-2016-4480
Publication date 18 May 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| linux | ||
| linux-armadaxp | ||
| linux-flo | ||
| linux-goldfish | ||
| linux-grouper | ||
| linux-linaro-omap | ||
| linux-linaro-shared | ||
| linux-linaro-vexpress | ||
| linux-lts-quantal | ||
| linux-lts-raring | ||
| linux-lts-saucy | ||
| linux-lts-trusty | ||
| linux-lts-utopic | ||
| linux-lts-vivid | ||
| linux-lts-wily | ||
| linux-lts-xenial | ||
| linux-maguro | ||
| linux-mako | ||
| linux-manta | ||
| linux-qcm-msm | ||
| linux-raspi2 | ||
| linux-snapdragon | ||
| linux-ti-omap4 | ||
| xen | ||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |