SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Xen Vendors:   Xen Project
Xen ARM DRAM Initialization Bug Lets Local Users on a Guest System View Portions of Memory from Another Guest Domain on the Target System
SecurityTracker Alert ID:  1039469
SecurityTracker URL:  http://securitytracker.com/id/1039469
CVE Reference:   CVE-2017-17046   (Links to External Site)
Updated:  Nov 30 2017
Original Entry Date:  Sep 29 2017
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Xen. A local user on a guest system can obtain potentially sensitive information from another guest system.

The software does not properly scrub DRAM contents during reboots when memory is in disjoint blocks or when the first block does not being at physical address 0.

A local user on a guest system can obtain potentially sensitive information from another guest domain after a reboot.

ARM systems are affected.

Impact:   A local user on a guest system can obtain potentially sensitive information from another guest domain on the target system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://xenbits.xen.org/xsa/advisory-245.html

Vendor URL:  xenbits.xen.org/xsa/advisory-245.html (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC