openSUSE Security Update : xen (openSUSE-2017-1023)

high Nessus Plugin ID 103159

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for xen fixes several issues.

These security issues were fixed :

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious guest to crash the host or potentially escalate privileges/leak information (XSA-226, bsc#1051787).

- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for privilege escalation (XSA-227, bsc#1051788).

- CVE-2017-12136: Race conditions with maptrack free list handling allows a malicious guest administrator to crash the host or escalate their privilege to that of the host (XSA-228, bsc#1051789).

- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049578).

- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046637).

- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to potentially leaking sensitive information (XSA-230 bsc#1052686.

These non-security issues were fixed :

- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack

- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0

- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1002573

https://bugzilla.opensuse.org/show_bug.cgi?id=1026236

https://bugzilla.opensuse.org/show_bug.cgi?id=1027519

https://bugzilla.opensuse.org/show_bug.cgi?id=1035231

https://bugzilla.opensuse.org/show_bug.cgi?id=1046637

https://bugzilla.opensuse.org/show_bug.cgi?id=1049578

https://bugzilla.opensuse.org/show_bug.cgi?id=1051787

https://bugzilla.opensuse.org/show_bug.cgi?id=1051788

https://bugzilla.opensuse.org/show_bug.cgi?id=1051789

https://bugzilla.opensuse.org/show_bug.cgi?id=1052686

https://bugzilla.opensuse.org/show_bug.cgi?id=1055695

Plugin Details

Severity: High

ID: 103159

File Name: openSUSE-2017-1023.nasl

Version: 3.4

Type: local

Agent: unix

Published: 9/13/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu, p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 9/8/2017

Reference Information

CVE: CVE-2017-10664, CVE-2017-11434, CVE-2017-12135, CVE-2017-12136, CVE-2017-12137, CVE-2017-12855