NULL pointer dereference in Xen - CVE-2016-3960
Published: April 19, 2016 / Updated: July 28, 2020
Xen
Xen Project
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping. <a href="http://cwe.mitre.org/data/definitions/476. A remote attacker can perform a denial of service (DoS) attack.
Remediation
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
- http://support.citrix.com/article/CTX209443
- http://www.debian.org/security/2016/dsa-3554
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/86318
- http://www.securitytracker.com/id/1035587
- http://xenbits.xen.org/xsa/advisory-173.html