7.2
CVSSv2

CVE-2015-7835

Published: 30/10/2015 Updated: 30/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 up to and including 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.4.0

xen xen 3.4.1

xen xen 4.0.3

xen xen 4.0.4

xen xen 4.1.0

xen xen 4.2.0

xen xen 4.2.1

xen xen 4.4.0

xen xen 4.4.1

xen xen 3.4.2

xen xen 3.4.3

xen xen 4.1.1

xen xen 4.1.2

xen xen 4.2.2

xen xen 4.2.3

xen xen 4.5.0

xen xen 4.5.1

xen xen 3.4.4

xen xen 4.0.0

xen xen 4.1.3

xen xen 4.1.4

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.6.0

xen xen 4.0.1

xen xen 4.0.2

xen xen 4.1.5

xen xen 4.1.6.1

xen xen 4.3.2

xen xen 4.3.4

Vendor Advisories

It was discovered that the code to validate level 2 page table entries is bypassed when certain conditions are satisfied A malicious PV guest administrator can take advantage of this flaw to gain privileges via a crafted superpage mapping For the oldstable distribution (wheezy), this problem has been fixed in version 414-3+deb7u9 For the stabl ...
The mod_l2_entry function in arch/x86/mmc in Xen 34 through 46x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping ...