CVE-2016-9381
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
23/01/2017
Last modified:
20/04/2025
Description
Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.7.1 (including) | |
cpe:2.3:a:qemu:qemu:2.8.0:rc0:*:*:*:*:*:* | ||
cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/94476
- http://www.securitytracker.com/id/1037344
- http://xenbits.xen.org/xsa/advisory-197.html
- https://security.gentoo.org/glsa/201612-56
- https://support.citrix.com/article/CTX218775
- http://www.securityfocus.com/bid/94476
- http://www.securitytracker.com/id/1037344
- http://xenbits.xen.org/xsa/advisory-197.html
- https://security.gentoo.org/glsa/201612-56
- https://support.citrix.com/article/CTX218775