First published: Mon Jan 23 2017(Updated: )
Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.7.1 | |
QEMU KVM | =2.8.0-rc0 | |
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9381 has a high severity rating due to its potential for privilege escalation in vulnerable systems.
To address CVE-2016-9381, upgrade QEMU or XenServer to the latest version that includes the applicable security patches.
CVE-2016-9381 affects local x86 HVM guest OS administrators on systems running the specified vulnerable versions of QEMU and XenServer.
CVE-2016-9381 is identified as a race condition vulnerability, which can lead to a double fetch issue.
Exploitation of CVE-2016-9381 may allow an attacker to gain elevated privileges on affected systems.