Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11740

Опубликовано: 14 апр. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.11.4-1package
xenend-of-lifestretchpackage
xenend-of-lifejessiepackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-313.html

EPSS

Процентиль: 29%
0.00108
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

CVSS3: 7.5
redhat
почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

CVSS3: 5.5
nvd
почти 6 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

CVSS3: 5.5
github
больше 3 лет назад

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.

suse-cvrf
почти 6 лет назад

Security update for xen

EPSS

Процентиль: 29%
0.00108
Низкий