Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10916

Опубликовано: 05 июл. 2017
Источник: debian

Описание

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.1-1+deb9u3package
xenfixed4.8.1-1+deb9u3stretchpackage
xennot-affectedjessiepackage
xennot-affectedwheezypackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-220.html

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

CVSS3: 8
redhat
больше 8 лет назад

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

CVSS3: 7.5
nvd
больше 8 лет назад

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

CVSS3: 7.5
github
больше 3 лет назад

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

suse-cvrf
больше 8 лет назад

Security update for xen