First published: Tue Aug 02 2016(Updated: )
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | =3.4.0 | |
Xen XAPI | =3.4.2 | |
Xen XAPI | =3.4.3 | |
Xen XAPI | =3.4.4 | |
Xen XAPI | =4.0.0 | |
Xen XAPI | =4.0.1 | |
Xen XAPI | =4.0.3 | |
Xen XAPI | =4.0.4 | |
Xen XAPI | =4.1.0 | |
Xen XAPI | =4.1.1 | |
Xen XAPI | =4.1.2 | |
Xen XAPI | =4.1.3 | |
Xen XAPI | =4.1.4 | |
Xen XAPI | =4.1.5 | |
Xen XAPI | =4.2.0 | |
Xen XAPI | =4.2.1 | |
Xen XAPI | =4.2.2 | |
Xen XAPI | =4.2.3 | |
Xen XAPI | =4.3.0 | |
Xen XAPI | =4.3.1 | |
Xen XAPI | =4.4.0 | |
Xen XAPI | =4.4.1 | |
Xen XAPI | =4.5.0 | |
Xen XAPI | =4.6.0 | |
Xen XAPI | =4.6.1 | |
Xen XAPI | =4.6.3 | |
Xen XAPI | =4.7.0 | |
XenServer | =6.0 | |
XenServer | =6.0.2 | |
XenServer | =6.1 | |
XenServer | =6.2.0-sp1 | |
XenServer | =6.5.0-sp1 | |
XenServer | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6258 is classified as a high-severity vulnerability that allows local 32-bit PV guest OS administrators to escalate privileges to the host OS.
CVE-2016-6258 can potentially allow unauthorized access to the host operating system, compromising the security of the entire virtualization environment.
To remediate CVE-2016-6258, upgrade to Xen version 4.7.1 or later, as this contains patches that address the vulnerability.
Any version of Xen prior to 4.7.1, including 3.4.x, 4.0.x, 4.1.x, 4.2.x, 4.3.x, 4.4.x, 4.5.x, and 4.6.x, are considered vulnerable to CVE-2016-6258.
XenServer versions including 6.0, 6.1, 6.2, 6.5, and 7.0 are affected by CVE-2016-6258, making them vulnerable to privilege escalation attacks.