CVE-2016-3158

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*
cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:49

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html - Third Party Advisory
References () http://support.citrix.com/article/CTX209443 - () http://support.citrix.com/article/CTX209443 -
References () http://www.debian.org/security/2016/dsa-3554 - () http://www.debian.org/security/2016/dsa-3554 -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Vendor Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Vendor Advisory
References () http://www.securityfocus.com/bid/85714 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/85714 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1035435 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035435 - Third Party Advisory, VDB Entry
References () http://xenbits.xen.org/xsa/advisory-172.html - Vendor Advisory () http://xenbits.xen.org/xsa/advisory-172.html - Vendor Advisory
References () http://xenbits.xen.org/xsa/xsa172-4.3.patch - Patch () http://xenbits.xen.org/xsa/xsa172-4.3.patch - Patch
References () http://xenbits.xen.org/xsa/xsa172.patch - Patch () http://xenbits.xen.org/xsa/xsa172.patch - Patch

Information

Published : 2016-04-13 16:59

Updated : 2024-11-21 02:49


NVD link : CVE-2016-3158

Mitre link : CVE-2016-3158

CVE.ORG link : CVE-2016-3158


JSON object : View

Products Affected

oracle

  • vm_server

fedoraproject

  • fedora

xen

  • xen
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-284

Improper Access Control