The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2971-2 | vendor advisory |
http://xenbits.xen.org/xsa/advisory-171.html | patch vendor advisory |
http://www.ubuntu.com/usn/USN-2970-1 | vendor advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | |
http://www.ubuntu.com/usn/USN-2969-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2968-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2971-3 | vendor advisory |
http://www.ubuntu.com/usn/USN-2997-1 | vendor advisory |
http://www.debian.org/security/2016/dsa-3607 | vendor advisory |
http://www.ubuntu.com/usn/USN-2971-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2996-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2968-2 | vendor advisory |
http://www.securitytracker.com/id/1035308 | vdb entry |
http://www.securityfocus.com/bid/84594 | vdb entry |