Description
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-720-1 | xen security update |
Debian DSA |
DSA-3729-1 | xen security update |
EUVD |
EUVD-2016-10192 | Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:50:36.977Z
Reserved: 2016-11-17T00:00:00.000Z
Link: CVE-2016-9382
No data.
Status : Modified
Published: 2017-01-23T21:59:02.830
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-9382
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD