CVE-2017-10916CVE-2017-10916

Affected configuration(s):

cpe:/o:xen:xen:4.5.0
cpe:/o:xen:xen:4.5.1
cpe:/o:xen:xen:4.5.2
cpe:/o:xen:xen:4.5.3
cpe:/o:xen:xen:4.5.5
cpe:/o:xen:xen:4.6.0
cpe:/o:xen:xen:4.6.1
cpe:/o:xen:xen:4.6.2
cpe:/o:xen:xen:4.6.4
cpe:/o:xen:xen:4.6.5
cpe:/o:xen:xen:4.7.1
cpe:/o:xen:xen:4.8.0
cpe:/o:xen:xen:4.8.1

Date published: 2017-07-04T21:29:00.707-04:00

Date last modified: 2017-11-03T21:29:31.880-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.debian.org/security/2017/dsa-3969

Summary: The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.