Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://xenbits.xen.org/xsa/xsa174.patch | x_refsource_CONFIRM |
| http://www.ubuntu.com/usn/USN-3006-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-3004-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-3001-1 | vendor-advisory x_refsource_UBUNTU |
| http://xenbits.xen.org/xsa/advisory-174.html | x_refsource_CONFIRM |
| http://www.ubuntu.com/usn/USN-3005-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.securitytracker.com/id/1035569 | vdb-entry x_refsource_SECTRACK |
| http://www.ubuntu.com/usn/USN-3049-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.debian.org/security/2016/dsa-3607 | vendor-advisory x_refsource_DEBIAN |
| http://www.ubuntu.com/usn/USN-3002-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-3050-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-3007-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.ubuntu.com/usn/USN-3003-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.securityfocus.com/bid/86068 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://xenbits.xen.org/xsa/xsa174.patch | x_refsource_CONFIRM x_transferred |
| http://www.ubuntu.com/usn/USN-3006-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.ubuntu.com/usn/USN-3004-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.ubuntu.com/usn/USN-3001-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://xenbits.xen.org/xsa/advisory-174.html | x_refsource_CONFIRM x_transferred |
| http://www.ubuntu.com/usn/USN-3005-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.securitytracker.com/id/1035569 | vdb-entry x_refsource_SECTRACK x_transferred |
| http://www.ubuntu.com/usn/USN-3049-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.debian.org/security/2016/dsa-3607 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.ubuntu.com/usn/USN-3002-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.ubuntu.com/usn/USN-3050-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.ubuntu.com/usn/USN-3007-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.ubuntu.com/usn/USN-3003-1 | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.securityfocus.com/bid/86068 | vdb-entry x_refsource_BID x_transferred |