Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-699-1 | xen security update |
Debian DSA |
DSA-3729-1 | xen security update |
EUVD |
EUVD-2016-8627 | Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:04:55.996Z
Reserved: 2016-09-09T00:00:00
Link: CVE-2016-7777
No data.
Status : Deferred
Published: 2016-10-07T14:59:10.287
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-7777
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD