Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7777

Опубликовано: 07 окт. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.3
CVSS3: 6.3

Описание

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

РелизСтатусПримечание
devel

released

4.7.0-0ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.7]]
esm-infra/xenial

released

4.6.0-1ubuntu4.2
precise

released

4.1.6.1-0ubuntu0.12.04.12
trusty

released

4.4.2-0ubuntu0.14.04.7
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.7]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

4.6.0-1ubuntu4.2

Показывать по

EPSS

Процентиль: 32%
0.00122
Низкий

3.3 Low

CVSS2

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
nvd
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

CVSS3: 6.3
debian
больше 9 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which ...

CVSS3: 6.3
github
больше 3 лет назад

Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.

suse-cvrf
около 9 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий

3.3 Low

CVSS2

6.3 Medium

CVSS3