CVE-2017-10916 PUBLISHED

The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

EPSS 0.39% · 60.0th percentile

Risk Scores

EPSS Score
0.39%
60.0th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSxen0, 4.5.1-0ubuntu1, 4.6.0-1ubuntu1

Timeline

References

Open in Interactive Console →