Medium severity6.3NVD Advisory· Published Oct 7, 2016· Updated May 6, 2026
CVE-2016-7777
CVE-2016-7777
Description
Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- xenbits.xen.org/xsa/advisory-190.htmlnvdMitigationPatchVendor Advisory
- www.securityfocus.com/bid/93344nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036942nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201611-09nvd
- support.citrix.com/article/CTX217363nvd
News mentions
0No linked articles in our index yet.