CVE-2016-3157

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 02:49

Type Values Removed Values Added
References () http://www.debian.org/security/2016/dsa-3607 - () http://www.debian.org/security/2016/dsa-3607 -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -
References () http://www.securityfocus.com/bid/84594 - () http://www.securityfocus.com/bid/84594 -
References () http://www.securitytracker.com/id/1035308 - () http://www.securitytracker.com/id/1035308 -
References () http://www.ubuntu.com/usn/USN-2968-1 - () http://www.ubuntu.com/usn/USN-2968-1 -
References () http://www.ubuntu.com/usn/USN-2968-2 - () http://www.ubuntu.com/usn/USN-2968-2 -
References () http://www.ubuntu.com/usn/USN-2969-1 - () http://www.ubuntu.com/usn/USN-2969-1 -
References () http://www.ubuntu.com/usn/USN-2970-1 - () http://www.ubuntu.com/usn/USN-2970-1 -
References () http://www.ubuntu.com/usn/USN-2971-1 - () http://www.ubuntu.com/usn/USN-2971-1 -
References () http://www.ubuntu.com/usn/USN-2971-2 - () http://www.ubuntu.com/usn/USN-2971-2 -
References () http://www.ubuntu.com/usn/USN-2971-3 - () http://www.ubuntu.com/usn/USN-2971-3 -
References () http://www.ubuntu.com/usn/USN-2996-1 - () http://www.ubuntu.com/usn/USN-2996-1 -
References () http://www.ubuntu.com/usn/USN-2997-1 - () http://www.ubuntu.com/usn/USN-2997-1 -
References () http://xenbits.xen.org/xsa/advisory-171.html - Patch, Vendor Advisory () http://xenbits.xen.org/xsa/advisory-171.html - Patch, Vendor Advisory

Information

Published : 2016-04-12 16:59

Updated : 2024-11-21 02:49


NVD link : CVE-2016-3157

Mitre link : CVE-2016-3157

CVE.ORG link : CVE-2016-3157


JSON object : View

Products Affected

xen

  • xen

canonical

  • ubuntu_linux
CWE
CWE-264

Permissions, Privileges, and Access Controls