6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.1 Medium
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
25.4%
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | le | 4.11.7 |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=089bc0143f489bd3a4578bdff5f4ca68fb26f341
www.debian.org/security/2017/dsa-3920
www.debian.org/security/2017/dsa-3927
www.debian.org/security/2017/dsa-3945
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.8
www.securityfocus.com/bid/99162
www.securitytracker.com/id/1038720
github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341
lists.debian.org/debian-lts-announce/2018/09/msg00007.html
security.gentoo.org/glsa/201708-03
xenbits.xen.org/xsa/advisory-216.html
6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.1 Medium
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
25.4%