Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93344 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036942 | Third Party Advisory VDB Entry |
http://xenbits.xen.org/xsa/advisory-190.html | Mitigation Patch Vendor Advisory |
https://security.gentoo.org/glsa/201611-09 | |
https://support.citrix.com/article/CTX217363 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-10-07T14:00:00
Updated: 2017-06-30T16:57:01
Reserved: 2016-09-09T00:00:00
Link: CVE-2016-7777
JSON object: View
NVD Information
Status : Modified
Published: 2016-10-07T14:59:10.287
Modified: 2017-07-01T01:30:08.313
Link: CVE-2016-7777
JSON object: View
Redhat Information
No data.
CWE