PatchSiren cyber security CVE debrief
CVE-2016-9384 Xen CVE debrief
CVE-2016-9384 is a Xen information-disclosure issue affecting Xen 4.7.0 and 4.7.1. According to NVD, a local guest OS user can obtain sensitive host information by loading a 32-bit ELF symbol table. The published CVSS vector (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) reflects a local attack with low privileges, changed scope, and high confidentiality impact.
- Vendor
- Xen
- Product
- CVE-2016-9384
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Operators of Xen 4.7.0 and 4.7.1 hosts, especially multi-tenant, cloud, or other shared environments where untrusted guest OS users can run workloads.
Technical summary
The corpus describes a Xen 4.7 flaw in which a guest-side user can trigger disclosure of sensitive host information through handling of a 32-bit ELF symbol table. NVD lists Xen 4.7.0 and 4.7.1 as vulnerable CPEs and maps the issue to CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vendor advisory XSA-194 and its patch are the primary remediation references.
Defensive priority
High for shared Xen 4.7 deployments; medium for isolated or non-production environments.
Recommended defensive actions
- Apply the Xen vendor fix referenced by XSA-194 and the accompanying patch.
- Inventory Xen 4.7.0 and 4.7.1 systems and confirm they are upgraded or otherwise remediated.
- Prioritize remediation on hosts that run untrusted or multi-tenant guest workloads.
- Check downstream distribution advisories, such as Gentoo GLSA-201612-56, for package-specific guidance.
Evidence notes
The CVE record and NVD detail both identify the issue as a Xen guest-to-host information disclosure. NVD provides the CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N, the CWE-200 mapping, and affected CPEs for Xen 4.7.0 and 4.7.1. Xen advisory XSA-194 and xsa194.patch are the vendor remediation references; Gentoo GLSA-201612-56 is a downstream advisory reference.
Official resources
-
CVE-2016-9384 CVE record
CVE.org
-
CVE-2016-9384 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
- Source reference
Publicly published on 2017-02-22. The NVD record was last modified on 2026-05-13; that date reflects record maintenance, not the original vulnerability date.