CVE-2016-3960
Published: 19 April 2016
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needed
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.6.0-1ubuntu4.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.6])
|
|
Patches: Upstream: http://xenbits.xen.org/xsa/xsa173-unstable.patch Upstream: http://xenbits.xen.org/xsa/xsa173-4.3.patch Upstream: http://xenbits.xen.org/xsa/xsa173-4.4.patch Upstream: http://xenbits.xen.org/xsa/xsa173-4.5.patch Upstream: http://xenbits.xen.org/xsa/xsa173-4.6.patch |
||
Binaries built from this source package are in Universe and so are supported by the community. |