{"id":"CVE-2017-17046","details":"An issue was discovered in Xen through 4.9.x on the ARM platform allowing guest OS users to obtain sensitive information from DRAM after a reboot, because disjoint blocks, and physical addresses that do not start at zero, are mishandled.","modified":"2026-03-12T22:31:18.018584Z","published":"2017-11-28T23:29:00.320Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201801-14"},{"type":"FIX","url":"https://xenbits.xen.org/xsa/advisory-245.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.9.1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17046.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}