High severity7.5NVD Advisory· Published Jul 5, 2017· Updated May 13, 2026
CVE-2017-10916
CVE-2017-10916
Description
The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
Affected products
13cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*+ 12 more
- cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- xenbits.xen.org/xsa/advisory-220.htmlnvdMailing ListMitigationVendor Advisory
- www.debian.org/security/2017/dsa-3969nvd
- www.securityfocus.com/bid/99167nvd
- www.securitytracker.com/id/1038730nvd
- security.gentoo.org/glsa/201708-03nvd
News mentions
0No linked articles in our index yet.