OracleVM 3.4 : xen (OVMSA-2021-0020)

high Nessus Plugin ID 151049

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address security updates:

- Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. (CVE-2021-0089)

- Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage. (CVE-2021-26313)

- x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details.
Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend. (CVE-2021-28690)

- inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded. (CVE-2021-28692)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected xen / xen-tools packages.

See Also

https://linux.oracle.com/cve/CVE-2021-0089.html

https://linux.oracle.com/cve/CVE-2021-26313.html

https://linux.oracle.com/cve/CVE-2021-28690.html

https://linux.oracle.com/cve/CVE-2021-28692.html

https://linux.oracle.com/errata/OVMSA-2021-0020.html

Plugin Details

Severity: High

ID: 151049

File Name: oraclevm_OVMSA-2021-0020.nasl

Version: 1.8

Type: local

Published: 6/28/2021

Updated: 1/26/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C

CVSS Score Source: CVE-2021-28692

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/25/2021

Vulnerability Publication Date: 6/9/2021

Reference Information

CVE: CVE-2021-0089, CVE-2021-26313, CVE-2021-28690, CVE-2021-28692

IAVB: 2021-B-0060-S