CVE-2017-10916

high

Description

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

References

https://xenbits.xen.org/xsa/advisory-220.html

https://security.gentoo.org/glsa/201708-03

http://www.securitytracker.com/id/1038730

http://www.securityfocus.com/bid/99167

http://www.debian.org/security/2017/dsa-3969

Details

Source: Mitre, NVD

Published: 2017-07-05

Updated: 2017-11-04

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High