CVE-2016-1570

Publication date 22 January 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.5 · High

Score breakdown

The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.

Read the notes from the security team

Status

Package Ubuntu Release Status
xen 15.10 wily
Fixed 4.5.1-0ubuntu1.3
15.04 vivid Ignored end of life
14.04 LTS trusty
Fixed 4.4.2-0ubuntu0.14.04.5
12.04 LTS precise
Fixed 4.1.6.1-0ubuntu0.12.04.10

Notes


mdeslaur

hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary


tyhicks

Feature disabled by default “Xen versions 3.4.0, 3.4.1, and from 4.1 onwards are affected.”

Severity score breakdown

Parameter Value
Base score 8.5 · High
Attack vector Network
Attack complexity High
Privileges required Low
User interaction None
Scope Changed
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H