An issue was discovered in Xen through 4.9.x on the ARM platform allowing guest OS users to obtain sensitive information from DRAM after a reboot, because disjoint blocks, and physical addresses that do not start at zero, are mishandled.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html | |
https://security.gentoo.org/glsa/201801-14 | |
https://xenbits.xen.org/xsa/advisory-245.html | Issue Tracking Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html | |
https://security.gentoo.org/glsa/201801-14 | |
https://xenbits.xen.org/xsa/advisory-245.html | Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html - | |
References | () https://security.gentoo.org/glsa/201801-14 - | |
References | () https://xenbits.xen.org/xsa/advisory-245.html - Issue Tracking, Patch, Vendor Advisory |
Information
Published : 2017-11-28 23:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-17046
Mitre link : CVE-2017-17046
CVE.ORG link : CVE-2017-17046
JSON object : View
Products Affected
xen
- xen
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor