vulnerability
FreeBSD: VID-523bb0b7-ba4d-11e6-ae1b-002590263bf5 (CVE-2016-9382): xen-kernel -- x86 task switch to VM86 mode mis-handled
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Dec 4, 2016 | Dec 4, 2016 | Dec 10, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 4, 2016
Added
Dec 4, 2016
Modified
Dec 10, 2025
Description
The Xen Project reports: LDTR, just like TR, is purely a protected mode facility. Hence even when switching to a VM86 mode task, LDTR loading needs to follow protected mode semantics. This was violated by the code. On SVM (AMD hardware): a malicious unprivileged guest process can escalate its privilege to that of the guest operating system. On both SVM and VMX (Intel hardware): a malicious unprivileged guest process can crash the guest.
Solution
freebsd-upgrade-package-xen-kernel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.