Oval Definition:oval:com.ubuntu.xenial:def:20164480000
Revision Date:2016-05-18Version:1
Title:CVE-2016-4480 on Ubuntu 16.04 LTS (xenial) - low.
Description:The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2016-4480
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-raspi2' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR NOT While related to the CVE in some way, the 'linux-snapdragon' package in xenial is not affected (note: 'not a kernel issue, it's a xen only issue').
  • OR The 'xen' package in xenial was vulnerable but has been fixed (note: '4.6.0-1ubuntu4.1').
  • BACK