Описание
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| devel | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-apps/focal | needed | |
| esm-apps/jammy | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-apps/noble | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | needed | |
| esm-infra/xenial | needed | |
| focal | ignored | end of standard support, was needed |
| groovy | ignored | end of life |
Показывать по
EPSS
2.1 Low
CVSS2
4.4 Medium
CVSS3
Связанные уязвимости
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
Xen through 4.14.x allows guest OS administrators to obtain sensitive ...
EPSS
2.1 Low
CVSS2
4.4 Medium
CVSS3