Description
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-964-1 | xen security update |
Debian DSA |
DSA-3847-1 | xen security update |
EUVD |
EUVD-2016-10719 | CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:07:31.379Z
Reserved: 2016-12-12T00:00:00.000Z
Link: CVE-2016-9932
No data.
Status : Modified
Published: 2017-01-26T15:59:00.407
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-9932
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD