Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3158

Опубликовано: 13 апр. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 1.7
CVSS3: 3.8

Описание

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

РелизСтатусПримечание
devel

released

4.6.0-1ubuntu5
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.6]]
esm-infra/xenial

released

4.6.0-1ubuntu4.1
precise

released

4.1.6.1-0ubuntu0.12.04.11
trusty

released

4.4.2-0ubuntu0.14.04.6
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.6]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

4.5.1-0ubuntu1.4

Показывать по

1.7 Low

CVSS2

3.8 Low

CVSS3

Связанные уязвимости

redhat
почти 10 лет назад

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

CVSS3: 3.8
nvd
почти 10 лет назад

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

CVSS3: 3.8
debian
почти 10 лет назад

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly ...

CVSS3: 3.8
github
больше 3 лет назад

The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.

fstec
почти 10 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю получить доступ к защищаемой информации содержимого регистра

1.7 Low

CVSS2

3.8 Low

CVSS3