CVE-2016-4480

Priority
Description
The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and
earlier does not properly handle the Page Size (PS) page table entry bit at
the L4 and L3 page table levels, which might allow local guest OS users to
gain privileges via a crafted mapping of memory.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-krillin:not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [not a kernel issue, it's a xen only issue])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [not a kernel issue, it's a xen only issue])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [not a kernel issue, it's a xen only issue])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was ignored)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (not a kernel issue, it's a xen only issue)
Package
Upstream:not-affected (not a kernel issue, it's a xen only issue)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Product
linux-vegetahd:not-affected (not a kernel issue, it's a xen only issue)
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [4.4.2-0ubuntu0.14.04.6])
Ubuntu 16.04 LTS (Xenial Xerus):released (4.6.0-1ubuntu4.1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-03-18 22:44:53 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)