High severity7.8NVD Advisory· Published Apr 12, 2016· Updated May 6, 2026
CVE-2016-3157
CVE-2016-3157
Description
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
Affected products
2- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- xenbits.xen.org/xsa/advisory-171.htmlnvdPatchVendor Advisory
- www.debian.org/security/2016/dsa-3607nvd
- www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlnvd
- www.securityfocus.com/bid/84594nvd
- www.securitytracker.com/id/1035308nvd
- www.ubuntu.com/usn/USN-2968-1nvd
- www.ubuntu.com/usn/USN-2968-2nvd
- www.ubuntu.com/usn/USN-2969-1nvd
- www.ubuntu.com/usn/USN-2970-1nvd
- www.ubuntu.com/usn/USN-2971-1nvd
- www.ubuntu.com/usn/USN-2971-2nvd
- www.ubuntu.com/usn/USN-2971-3nvd
- www.ubuntu.com/usn/USN-2996-1nvd
- www.ubuntu.com/usn/USN-2997-1nvd
News mentions
0No linked articles in our index yet.