CVE-2016-3960

Published: 19 April 2016

Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
xen
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 16.04 LTS (Xenial Xerus)
Released (4.6.0-1ubuntu4.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [4.4.2-0ubuntu0.14.04.6])
Patches:
Upstream: http://xenbits.xen.org/xsa/xsa173-unstable.patch
Upstream: http://xenbits.xen.org/xsa/xsa173-4.3.patch
Upstream: http://xenbits.xen.org/xsa/xsa173-4.4.patch
Upstream: http://xenbits.xen.org/xsa/xsa173-4.5.patch
Upstream: http://xenbits.xen.org/xsa/xsa173-4.6.patch
Binaries built from this source package are in Universe and so are supported by the community.