Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:3416-1

Опубликовано: 19 нояб. 2020
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security issue fixed:

  • CVE-2020-28368: Fixed the Intel RAPL sidechannel attack, aka PLATYPUS attack, aka XSA-351 (bsc#1178591).

Non-security issue fixed:

  • Adjusted help for --max_iters, default is 5 (bsc#1177950).

Список пакетов

Image SLES15-EC2-CHOST-HVM-BYOS
xen-libs-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
Image SLES15-EC2-HVM-BYOS
xen-libs-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
Image SLES15-SAP-EC2-HVM
xen-libs-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
Image SLES15-SAP-EC2-HVM-BYOS
xen-libs-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
xen-4.10.4_20-3.47.1
xen-devel-4.10.4_20-3.47.1
xen-libs-4.10.4_20-3.47.1
xen-tools-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
SUSE Linux Enterprise High Performance Computing 15-LTSS
xen-4.10.4_20-3.47.1
xen-devel-4.10.4_20-3.47.1
xen-libs-4.10.4_20-3.47.1
xen-tools-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1
SUSE Linux Enterprise Server for SAP Applications 15
xen-4.10.4_20-3.47.1
xen-devel-4.10.4_20-3.47.1
xen-libs-4.10.4_20-3.47.1
xen-tools-4.10.4_20-3.47.1
xen-tools-domU-4.10.4_20-3.47.1

Описание

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_20-3.47.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_20-3.47.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_20-3.47.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_20-3.47.1

Ссылки