5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
26.3%
Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 15.10 | |
ubuntu_linux | eq | 14.04 | |
xen | le | 4.5.3 |
www.debian.org/security/2016/dsa-3607
www.securityfocus.com/bid/86068
www.securitytracker.com/id/1035569
www.ubuntu.com/usn/USN-3001-1
www.ubuntu.com/usn/USN-3002-1
www.ubuntu.com/usn/USN-3003-1
www.ubuntu.com/usn/USN-3004-1
www.ubuntu.com/usn/USN-3005-1
www.ubuntu.com/usn/USN-3006-1
www.ubuntu.com/usn/USN-3007-1
www.ubuntu.com/usn/USN-3049-1
www.ubuntu.com/usn/USN-3050-1
xenbits.xen.org/xsa/advisory-174.html
xenbits.xen.org/xsa/xsa174.patch
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
Low
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
26.3%