CVE-2017-10911
low-risk
Published 2017-07-05
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (22)
Third Party Advisory
http://www.securityfocus.com/bid/99162
Third Party Advisory
http://www.securitytracker.com/id/1038720
Third Party Advisory
http://www.securityfocus.com/bid/99162
Third Party Advisory
http://www.securitytracker.com/id/1038720
and 2 more references
26
/ 100
low-risk
Severity
21/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal