Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-28368

Опубликовано: 10 нояб. 2020
Источник: debian
EPSS Низкий

Описание

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.14.0+80-gd101b417b7-1package
xenend-of-lifestretchpackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-351.html

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 5 лет назад

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

CVSS3: 5.6
redhat
около 5 лет назад

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

CVSS3: 4.4
nvd
около 5 лет назад

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.

suse-cvrf
около 5 лет назад

Security update for xen

suse-cvrf
около 5 лет назад

Security update for xen

EPSS

Процентиль: 21%
0.00067
Низкий