vulnerability
FreeBSD: VID-4aae54be-ba4d-11e6-ae1b-002590263bf5 (CVE-2016-7094): xen-kernel -- x86 HVM: Overflow of sh_ctxt->seg_reg[]
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:M/Au:S/C:N/I:N/A:P) | Dec 4, 2016 | Dec 4, 2016 | Dec 10, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:S/C:N/I:N/A:P)
Published
Dec 4, 2016
Added
Dec 4, 2016
Modified
Dec 10, 2025
Description
The Xen Project reports: x86 HVM guests running with shadow paging use a subset of the x86 emulator to handle the guest writing to its own pagetables. There are situations a guest can provoke which result in exceeding the space allocated for internal state. A malicious HVM guest administrator can cause Xen to fail a bug check, causing a denial of service to the host.
Solution
freebsd-upgrade-package-xen-kernel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.