Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7777

Опубликовано: 07 окт. 2016
Источник: debian
EPSS Низкий

Описание

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.0~rc3-1package

Примечания

  • http://xenbits.xen.org/xsa/advisory-190.html

EPSS

Процентиль: 32%
0.00122
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.1
redhat
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
nvd
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
github
больше 3 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

suse-cvrf
около 9 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий