Skip to main content
Mallory

Xen Patches Cross-Guest Data Leak on AMD Zen1 CPUs

widely-deployed-product-advisorycloud-service-vulnerabilityembedded-device-vulnerability
Updated April 30, 2026 at 09:17 PM2 sources
Share:
Xen Patches Cross-Guest Data Leak on AMD Zen1 CPUs

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Xen disclosed XSA-488, a transient execution vulnerability named Floating Point Divider State Sampling that affects x86 deployments running on vulnerable AMD Fam17h (Zen1) processors. The flaw was identified by researchers from the CISPA Helmholtz Center for Information Security, and Xen said an attacker may be able to infer data from other execution contexts, including other guest VMs, creating a cross-tenant confidentiality risk for virtualized environments.

According to the advisory, all Xen versions are affected when deployed on the impacted CPU family. Xen said no mitigations are currently available, but released fixes for xen-unstable and the supported 4.20/4.19, 4.18, and 4.17 branches, urging operators on affected hardware to apply the relevant patches to reduce exposure.

Timeline

  1. Apr 17, 2026

    Xen discloses XSA-488 and releases patches

    Xen published Security Advisory 488, stating that all Xen versions are affected on vulnerable CPUs and that attackers may be able to infer data from other contexts, including other guests. Xen also released patches for xen-unstable and the Xen 4.20/4.19, 4.18, and 4.17 branches, while noting that no mitigations were available.

  2. Apr 17, 2026

    CISPA researchers discover Xen FP Divider State Sampling issue

    Researchers from the CISPA Helmholtz Center for Information Security identified a new transient execution vulnerability dubbed Floating Point Divider State Sampling affecting Xen on x86 systems running on AMD Fam17h CPUs based on the Zen1 microarchitecture.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

April 17, 2026 at 12:00 AM

Related Stories

Xen Advisories Disclose Linux Guest Kernel Flaws Enabling Privilege Escalation

Xen Advisories Disclose Linux Guest Kernel Flaws Enabling Privilege Escalation

Xen has disclosed two Linux guest kernel vulnerabilities affecting virtualized environments, warning that both issues require patching and have no known mitigations. **CVE-2026-31786** (`XSA-485`) affects Linux kernels **4.13 and later** in Xen domains through unsafe handling of the binary build ID exposed at `/sys/hypervisor/properties/buildid`. The bug uses `sprintf()` on a non-null-terminated binary value, which can trigger an out-of-bounds read and, in rare cases, a write past the 4 KB sysfs buffer, potentially leading to **information disclosure, denial of service, or privilege escalation** inside Linux Xen guests. A second advisory, **CVE-2026-31787** (`XSA-487`), describes a **double-free** flaw in the Linux **Xen `privcmd` driver** that allows a **root user in a Linux guest** to bypass kernel lockdown protections tied to secure boot. Xen said the issue affects Linux **PVH or HVM domains** on **x86 and Arm** from kernel **3.8 onward**, while PV domains and non-Linux guests are not affected. The vulnerabilities were reported by **Frediano Ziglio of XenServer** and **Atharva Vartak (@0xAth4rv)**, respectively, and Xen urged operators to apply the supplied Linux patches.

2 days ago
StackWarp Side-Channel Weakness Undermines AMD SEV-SNP Confidential VMs

StackWarp Side-Channel Weakness Undermines AMD SEV-SNP Confidential VMs

Researchers at **CISPA Helmholtz Center for Information Security** disclosed **StackWarp** (**CVE-2025-29943**), a microarchitectural weakness affecting **AMD Zen** CPUs that can undermine the integrity guarantees of **AMD SEV-SNP** “confidential VM” protections. The attack model assumes a **malicious insider with host/hypervisor control** who can run a parallel hyperthread and exploit a previously undocumented hypervisor-side control bit to manipulate the protected guest’s stack pointer behavior, particularly when **Simultaneous Multithreading (SMT)** is enabled. Reported impacts include the ability to recover sensitive data from SEV-SNP guests—such as **cryptographic private keys**—and to enable follow-on compromise scenarios like **bypassing OpenSSH password authentication** and **privilege escalation** within the VM. AMD issued patches (made available in **July 2025**) and later published a security bulletin rating the issue **low severity**, but the disclosure highlights ongoing risk that confidential computing isolation can be weakened by CPU-level behaviors; organizations running SEV-SNP should prioritize applying AMD’s updates and review SMT-related exposure in multi-tenant or high-trust boundary environments.

1 months ago
Xen Advisory Warns Linux `privcmd` Flaw Can Bypass Kernel Lockdown

Xen Advisory Warns Linux `privcmd` Flaw Can Bypass Kernel Lockdown

Xen disclosed **XSA-482** for **CVE-2026-31788**, a flaw in the Linux kernel's `privcmd` driver that can let an administrator inside an unprivileged Xen guest bypass kernel lockdown protections enforced under secure boot. The bug can be abused to perform actions on the guest kernel that should be blocked in secure mode, including modifying page tables in a way that could allow user mode to alter kernel memory. The issue affects Xen **PV, PVH, and HVM** guests running Linux with secure boot enabled. Xen said BSD-based systems are believed unaffected because they do not support secure boot in this context. The vulnerability was discovered by **Teddy Astie of Vates**, no mitigation is currently known, and remediation requires applying the published Linux patch set; the latest advisory revision notes that the flaw has now been assigned **`CVE-2026-31788`**.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.