Correct me if I'm wrong, but <http://xenbits.xen.org/xsa/advisory-176.html> is a *Xen* Bug, not a *Linux-Kernel* Bug: "xen/arch/x86/mm/guest_walk.c" is in the Hypervisor part of Xen.
I tried to back-port the bug to xen-4.1.6.1 from Precise but the patch is not applicable directly, as xen-4.1 does not seem to support 1GiB super pages; it was only introduced in xen-4.2: $ git l1 -1 96b740e2 96b740e x86/mm: Handle 1GiB superpages in the pagetable walker. $ git describe --contains 96b740e2 4.2.0-rc1~1863 I don't know what would happen if xen-4.1 would run on a CPU supporting 1GiB large pages. Either 1GiB SP should be disabled are 96b740e2 needs to be back-ported as a pre-requisite for 46699c7393bd991234b5642763c5c24b6b39a6c4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1583960 Title: CVE-2016-4480 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1583960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs