CVE-2016-3159
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
13/04/2016
Last modified:
12/04/2025
Description
The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
Impact
Base Score 3.x
3.80
Severity 3.x
LOW
Base Score 2.0
1.70
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.3.0 (including) | 4.3.4 (including) |
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.4.0 (including) | 4.4.4 (including) |
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.5.0 (including) | 4.5.3 (including) |
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.6.0 (including) | 4.6.1 (including) |
| cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html
- http://support.citrix.com/article/CTX209443
- http://www.debian.org/security/2016/dsa-3554
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/85716
- http://www.securitytracker.com/id/1035435
- http://xenbits.xen.org/xsa/advisory-172.html
- http://xenbits.xen.org/xsa/xsa172.patch
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html
- http://support.citrix.com/article/CTX209443
- http://www.debian.org/security/2016/dsa-3554
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/85716
- http://www.securitytracker.com/id/1035435
- http://xenbits.xen.org/xsa/advisory-172.html
- http://xenbits.xen.org/xsa/xsa172.patch



