CVE-2016-7777

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/93344 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93344 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036942 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036942 - Third Party Advisory, VDB Entry
References () http://xenbits.xen.org/xsa/advisory-190.html - Mitigation, Patch, Vendor Advisory () http://xenbits.xen.org/xsa/advisory-190.html - Mitigation, Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/201611-09 - () https://security.gentoo.org/glsa/201611-09 -
References () https://support.citrix.com/article/CTX217363 - () https://support.citrix.com/article/CTX217363 -

Information

Published : 2016-10-07 14:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7777

Mitre link : CVE-2016-7777

CVE.ORG link : CVE-2016-7777


JSON object : View

Products Affected

xen

  • xen
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')