Unrated severityNVD Advisory· Published Apr 14, 2020· Updated Aug 4, 2024
CVE-2020-11740
CVE-2020-11740
Description
An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.
Affected products
27- Xen/xenoprofdescription
- osv-coords26 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/xen&distro=SUSE%20Enterprise%20Storage%205pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208
< 4.12.2_04-lp151.2.15.1+ 25 more
- (no CPE)range: < 4.12.2_04-lp151.2.15.1
- (no CPE)range: < 4.15.1_01-1.2
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.10.4_10-3.31.1
- (no CPE)range: < 4.10.4_10-3.31.1
- (no CPE)range: < 4.12.2_04-3.15.1
- (no CPE)range: < 4.12.2_04-3.15.1
- (no CPE)range: < 4.2.5_22-45.36.1
- (no CPE)range: < 4.4.4_42-61.52.1
- (no CPE)range: < 4.7.6_08-43.64.1
- (no CPE)range: < 4.7.6_08-43.64.1
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.11.3_04-2.23.1
- (no CPE)range: < 4.12.2_04-3.11.1
- (no CPE)range: < 4.7.6_08-43.64.1
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.11.3_04-2.23.1
- (no CPE)range: < 4.12.2_04-3.11.1
- (no CPE)range: < 4.10.4_10-3.31.1
- (no CPE)range: < 4.11.3_04-2.23.1
- (no CPE)range: < 4.12.2_04-3.11.1
- (no CPE)range: < 4.7.6_08-43.64.1
- (no CPE)range: < 4.9.4_06-3.62.1
- (no CPE)range: < 4.9.4_06-3.62.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/mitrevendor-advisoryx_refsource_FEDORA
- security.gentoo.org/glsa/202005-08mitrevendor-advisoryx_refsource_GENTOO
- www.debian.org/security/2020/dsa-4723mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2020/04/14/1mitremailing-listx_refsource_MLIST
- xenbits.xen.org/xsa/advisory-313.htmlmitrex_refsource_CONFIRM
- xenbits.xen.org/xsa/advisory-313.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.