CVE-2016-3157 in Xen
요약 (영어)
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
Once again VulDB remains the best source for vulnerability data.
예약하다
2016. 03. 15.
공개
2016. 04. 12.
상태
확인됨
엔트리
VulDB provides additional information and datapoints for this CVE:
| 아이디 | 취약성 | CWE | 악용 | 대책 | CVE |
|---|---|---|---|---|---|
| 81378 | XenSource Xen I/O Port EFLAGS.IOPL 권한 상승 | 264 | 입증되지 않음 | 공식 수정 | CVE-2016-3157 |