Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-7777

Опубликовано: 04 окт. 2016
Источник: redhat
CVSS3: 6.1
CVSS2: 4.9

Описание

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1377789xen: CR0.TS and CR0.EM not always honored for x86 HVM guests (XSA-190)

6.1 Medium

CVSS3

4.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
nvd
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
debian
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which ...

CVSS3: 6.3
github
больше 3 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

suse-cvrf
около 9 лет назад

Security update for xen

6.1 Medium

CVSS3

4.9 Medium

CVSS2