openSUSE Security Update : xen (openSUSE-2016-36)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for xen fixes the following issues :

- CVE-2015-8567,CVE-2015-8568: xen: qemu: net: vmxnet3:
host memory leakage (boo#959387)

- CVE-2015-8550: xen: paravirtualized drivers incautious
about shared memory contents (XSA-155, boo#957988)

- CVE-2015-8558: xen: qemu: usb: infinite loop in
ehci_advance_state results in DoS (boo#959006)

- CVE-2015-7549: xen: qemu pci: NULL pointer dereference
issue (boo#958918)

- CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point
exception (boo#958493)

- CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X
handling (XSA-164, boo#958007)

- CVE-2015-8555: xen: information leak in legacy x86
FPU/XMM initialization (XSA-165, boo#958009)

- boo#958523: xen: ioreq handling possibly susceptible to
multiple read issue (XSA-166)

- CVE-2015-8345: xen: qemu: net: eepro100: infinite loop
in processing command block list (boo#956832)

- CVE-2015-5307: xen: x86: CPU lockup during fault
delivery (XSA-156, boo#954018)

- boo#956592: xen: virtual PMU is unsupported (XSA-163)

- CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error
handling issues (XSA-159, boo#956408)

- CVE-2015-8341: xen: libxl leak of pv kernel and initrd
on error (XSA-160, boo#956409)

- CVE-2015-7504: xen: heap buffer overflow vulnerability
in pcnet emulator (XSA-162, boo#956411)

See also :

Solution :

Update the affected xen packages.

Risk factor :

High / CVSS Base Score : 7.8

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now