Oval Definition:oval:com.ubuntu.trusty:def:20164480000
Revision Date:2016-05-18Version:1
Title:CVE-2016-4480 on Ubuntu 14.04 LTS (trusty) - low.
Description:The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2016-4480
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in trusty is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR NOT While related to the CVE in some way, the 'linux-lts-utopic' package in trusty is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-lts-vivid' package in trusty is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-lts-wily' package in trusty is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-lts-xenial' package in trusty is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR While related to the CVE in some way, a decision has been made to ignore it.
  • OR The 'xen' package in trusty was vulnerable but has been fixed (note: '4.4.2-0ubuntu0.14.04.6').
  • BACK