The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.3.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.6.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4.0-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.5.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.5.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.6.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1571.json"