openSUSE Security Update : xen (openSUSE-2015-113)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The virtualization software XEN was updated to version 4.3.3 and also
to fix bugs and security issues.

Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to
use after free on hvm guest teardown

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

CVE-2014-9030: XSA-113: Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling

CVE-2014-8867: XSA-112: xen: Insufficient bounding of 'REP MOVS' to
MMIO emulated inside the hypervisor

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode
hypercall argument translation

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86
emulation of far branches

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU
update hypercalls

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can
be evaded by native NMI interrupts

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu
operations are not preemptible

Bugs fixed :

- bnc#903357 - Corrupted save/restore test leaves orphaned
data in xenstore

- bnc#903359 - Temporary migration name is not cleaned up
after migration

- bnc#903850 - VUL-0: Xen: guest user mode triggerable VM
exits not handled by hypervisor

- bnc#866902 - L3: Xen save/restore of HVM guests cuts off
disk and networking

- bnc#901317 - L3: increase limit domUloader to 32MB
domUloader.py

- bnc#882089 - Windows 2012 R2 fails to boot up with
greater than 60 vcpus

- bsc#900292 - xl: change default dump directory

- Update to Xen 4.3.3

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=826717
https://bugzilla.opensuse.org/show_bug.cgi?id=866902
https://bugzilla.opensuse.org/show_bug.cgi?id=882089
https://bugzilla.opensuse.org/show_bug.cgi?id=889526
https://bugzilla.opensuse.org/show_bug.cgi?id=900292
https://bugzilla.opensuse.org/show_bug.cgi?id=901317
https://bugzilla.opensuse.org/show_bug.cgi?id=903357
https://bugzilla.opensuse.org/show_bug.cgi?id=903359
https://bugzilla.opensuse.org/show_bug.cgi?id=903850
https://bugzilla.opensuse.org/show_bug.cgi?id=903967
https://bugzilla.opensuse.org/show_bug.cgi?id=903970
https://bugzilla.opensuse.org/show_bug.cgi?id=905465
https://bugzilla.opensuse.org/show_bug.cgi?id=905467
https://bugzilla.opensuse.org/show_bug.cgi?id=906439
https://bugzilla.opensuse.org/show_bug.cgi?id=906996
https://bugzilla.opensuse.org/show_bug.cgi?id=910681

Solution :

Update the affected xen packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now