An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.
The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
Link | Tags |
---|---|
https://xenbits.xen.org/xsa/advisory-313.html | patch vendor advisory |
http://xenbits.xen.org/xsa/advisory-313.html | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2020/04/14/1 | mailing list third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YMAW7D2MP6RE4BFI5BZWOBBWGY3VSOFN/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5M2XRNCHOGGTJQBZQJ7DCV6ZNAKN3LE2/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html | mailing list third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NVTP4OYHCTRU3ONFJOFJQVNDFB25KLLG/ | vendor advisory |
https://security.gentoo.org/glsa/202005-08 | third party advisory vendor advisory |
https://www.debian.org/security/2020/dsa-4723 | third party advisory vendor advisory |