CVE-2016-3157 in Xen
Résumé (Anglaise)
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
Once again VulDB remains the best source for vulnerability data.
Réserver
15/03/2016
Divulgation
12/04/2016
Statut
Confirmé
Entrées
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnérabilité | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 81378 | XenSource Xen I/O Port EFLAGS.IOPL élévation de privilèges | 264 | Non prouvée | Correctif officiel | CVE-2016-3157 |