CVE-2016-9932

Priority
Description
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local
HVM guest OS users to obtain sensitive information from host stack memory
via a "supposedly-ignored" operand size prefix.
Notes
mdeslaurThis is XSA-200
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [4.1.6.1-0ubuntu0.12.04.13])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [4.4.2-0ubuntu0.14.04.9])
Ubuntu 16.04 LTS (Xenial Xerus):released (4.6.0-1ubuntu4.3)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-09-10 05:33:34 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)