This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The Xen Project reports :
In the x86 shadow pagetable code, the guest frame number of a
superpage mapping is stored in a 32-bit field. If a shadowed guest can
cause a superpage mapping of a guest-physical address at or above 2^44
to be shadowed, the top bits of the address will be lost, causing an
assertion failure or NULL dereference later on, in code that removes
A HVM guest using shadow pagetables can cause the host to crash.
A PV guest using shadow pagetables (i.e. being migrated) with PV
superpages enabled (which is not the default) can crash the host, or
corrupt hypervisor memory, and so a privilege escalation cannot be
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.2