PatchSiren cyber security CVE debrief
CVE-2016-9377 Xen CVE debrief
CVE-2016-9377 is a Xen denial-of-service issue affecting Xen 4.5.x through 4.7.x on AMD systems that do not have the NRip feature. According to the CVE description and NVD data, a local user inside an HVM guest can cause a guest crash when Xen emulates instructions that generate software interrupts, due to an IDT entry miscalculation. The impact is availability-only and is rated medium severity in the supplied record.
- Vendor
- Xen
- Product
- CVE-2016-9377
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Xen administrators, virtualization teams, and platform owners running affected Xen versions on AMD hardware without NRip should pay attention, especially where untrusted or multi-tenant HVM guests are allowed.
Technical summary
The NVD record identifies Xen versions 4.5.0 through 4.7.1 as vulnerable. On affected AMD systems without NRip, Xen’s emulation path for instructions that generate software interrupts can miscalculate an IDT entry, allowing a local HVM guest OS user to trigger a denial of service in the guest. The supplied CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, which aligns with a local, low-complexity availability impact. The weakness is mapped to CWE-682 in the source data.
Defensive priority
Medium. This is a local-impact availability issue rather than a remote code execution flaw, but it can still disrupt guest workloads and should be prioritized on affected Xen/AMD deployments.
Recommended defensive actions
- Review the Xen security advisory XSA-196 and apply the vendor or distribution-fixed package for affected hosts.
- Confirm whether your AMD systems lack NRip support and inventory Xen hosts running 4.5.x through 4.7.x.
- Use the linked Gentoo GLSA as a reference point for downstream remediation guidance and package status.
- Validate that guest crash or hypervisor stability issues are not present after updating, using normal operational monitoring and incident procedures.
Evidence notes
The supplied NVD metadata states the affected product scope as Xen 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.5, 4.6.0, 4.6.1, 4.6.3, 4.6.4, 4.7.0, and 4.7.1. The CVE description adds the AMD-without-NRip condition and the local HVM guest-triggered guest crash behavior. Timing context: the CVE was published on 2017-02-22, and the NVD record was last modified on 2026-05-13; the modified date is a record-update date, not the vulnerability date.
Official resources
-
CVE-2016-9377 CVE record
CVE.org
-
CVE-2016-9377 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
Publicly disclosed in the CVE/NVD record on 2017-02-22. The NVD entry shown in the source corpus was last modified on 2026-05-13.