First published: Wed Apr 13 2016(Updated: )
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | <=4.4.0 | |
Fedora | =22 | |
Fedora | =23 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3158 is considered to have a high severity level due to the potential for sensitive information exposure between guest OS instances.
To fix CVE-2016-3158, you should update Xen to a version later than 4.4.0 and ensure that your systems are running on patched versions from the relevant vendors.
CVE-2016-3158 affects users of Xen 4.x and specific versions of Fedora and Oracle VM Server that are mentioned in the vulnerability identification.
CVE-2016-3158 is a local information disclosure vulnerability that can allow guest OS users to access sensitive register information from other guests.
CVE-2016-3158 cannot be exploited remotely as it requires local access to the guest OS to leverage the vulnerability.