Description
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-720-1 | xen security update |
Debian DSA |
DSA-3729-1 | xen security update |
EUVD |
EUVD-2016-10193 | Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:50:37.786Z
Reserved: 2016-11-17T00:00:00.000Z
Link: CVE-2016-9383
No data.
Status : Deferred
Published: 2017-01-23T21:59:02.860
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-9383
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD