Correct me if I'm wrong, but
<http://xenbits.xen.org/xsa/advisory-176.html> is a *Xen* Bug, not a
*Linux-Kernel* Bug: "xen/arch/x86/mm/guest_walk.c" is in the Hypervisor
part of Xen.

I tried to back-port the bug to xen-4.1.6.1 from Precise but the patch
is not applicable directly, as xen-4.1 does not seem to support 1GiB
super pages; it was only introduced in xen-4.2:

$ git l1 -1 96b740e2
96b740e x86/mm: Handle 1GiB superpages in the pagetable walker.
$ git describe --contains 96b740e2
4.2.0-rc1~1863

I don't know what would happen if xen-4.1 would run on a CPU supporting 1GiB 
large pages.
Either 1GiB SP should be disabled are 96b740e2 needs to be back-ported as a 
pre-requisite for 46699c7393bd991234b5642763c5c24b6b39a6c4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1583960

Title:
  CVE-2016-4480

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1583960/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to