First published: Wed May 03 2017(Updated: )
Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.2.5 | |
SUSE Manager | =2.1 | |
suse manager proxy | =2.1 | |
openSUSE OpenStack Cloud | =5 | |
SUSE Linux Enterprise Point of Sale | =11.0-sp3 | |
SUSE Linux Enterprise Server | =11.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7995 has a high severity rating as it allows unauthorized access to MMIO ranges leading to potential information disclosure.
To fix CVE-2017-7995, upgrade to Xen version 4.5.x or later, which addresses the access permission checks.
CVE-2017-7995 affects Xen versions before 4.3, as well as specific versions of SUSE Manager, SUSE Manager Proxy, and others.
CVE-2017-7995 is an information disclosure vulnerability caused by improper access permission checks.
There is no official workaround for CVE-2017-7995; users are advised to upgrade affected software to mitigate risk.