The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3969 | |
http://www.securityfocus.com/bid/99167 | |
http://www.securitytracker.com/id/1038730 | |
https://security.gentoo.org/glsa/201708-03 | |
https://xenbits.xen.org/xsa/advisory-220.html | Mailing List Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-07-05T01:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2017-07-04T00:00:00
Link: CVE-2017-10916
JSON object: View
NVD Information
Status : Modified
Published: 2017-07-05T01:29:00.707
Modified: 2017-11-04T01:29:31.880
Link: CVE-2017-10916
JSON object: View
Redhat Information
No data.
CWE