First published: Tue Nov 28 2017(Updated: )
An issue was discovered in Xen through 4.9.x on the ARM platform allowing guest OS users to obtain sensitive information from DRAM after a reboot, because disjoint blocks, and physical addresses that do not start at zero, are mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17046 is considered to have a high severity due to the potential exposure of sensitive information from the guest OS.
To fix CVE-2017-17046, upgrade to Xen versions 4.11.4+107-gef32c7afa2-1, 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2+55-g0b56bed864-1.
CVE-2017-17046 specifically affects the ARM platform running Xen through version 4.9.x.
Yes, guest OS users can exploit CVE-2017-17046 to obtain sensitive information from DRAM after a system reboot.
There are no known workarounds for CVE-2017-17046, and the recommended mitigation is to upgrade to a secure version.