Release Date: | 2016-10-04 | |
Impact: | Moderate | What is this? |
Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, whichallows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
See more information about CVE-2016-7777 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 4.9 |
Vector String: | AV:N/AC:M/Au:S/C:P/I:P/A:N |
Version: | 2.0 |
Attack Vector: | Network |
Attack Complexity: | Medium |
Authentication: | Single |
Confidentiality Impact: | Partial |
Integrity Impact: | Partial |
Availability Impact: | None |
Platform | Errata | Release Date |
Oracle VM version 3.2 (xen) | OVMSA-2016-0166 | 2016-11-22 |
Oracle VM version 3.3 (xen) | OVMSA-2016-0165 | 2016-11-22 |
Oracle VM version 3.4 (xen) | OVMSA-2016-0164 | 2016-11-22 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: