Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10911

Опубликовано: 05 июл. 2017
Источник: debian
EPSS Низкий

Описание

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.11.11-1package
qemufixed1:2.8+dfsg-7package
qemuno-dsawheezypackage
qemu-kvmremovedpackage
qemu-kvmno-dsawheezypackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-216.html

EPSS

Процентиль: 24%
0.00082
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.

CVSS3: 3
redhat
больше 8 лет назад

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.

CVSS3: 6.5
nvd
больше 8 лет назад

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.

CVSS3: 6.5
github
больше 3 лет назад

The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.

suse-cvrf
больше 8 лет назад

Security update for qemu

EPSS

Процентиль: 24%
0.00082
Низкий