First published: Wed Apr 13 2016(Updated: )
The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 | |
Xen xen-unstable | >=4.3.0<=4.3.4 | |
Xen xen-unstable | >=4.4.0<=4.4.4 | |
Xen xen-unstable | >=4.5.0<=4.5.3 | |
Xen xen-unstable | >=4.6.0<=4.6.1 | |
Fedora | =22 | |
Fedora | =23 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-3159 is classified as medium, as it allows unauthorized access to sensitive information across guest OS environments.
To fix CVE-2016-3159, update your Xen or Oracle VM Server to a version that addresses this vulnerability.
CVE-2016-3159 affects several versions of Xen from 4.3.0 to 4.6.1 and specific releases of Oracle VM Server 3.3 and 3.4.
CVE-2016-3159 is a local information disclosure vulnerability that can be exploited by a guest OS user.
No, CVE-2016-3159 requires local access to the affected guest OS to be exploited.