Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://support.citrix.com/article/CTX217363 | |
http://xenbits.xen.org/xsa/advisory-190.html | patch vendor advisory mitigation |
http://www.securityfocus.com/bid/93344 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201611-09 | vendor advisory |
http://www.securitytracker.com/id/1036942 | vdb entry third party advisory |