openSUSE Security Update : xen (openSUSE-SU-2014:1279-1)

high Nessus Plugin ID 78116
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6

Synopsis

The remote openSUSE host is missing a security update.

Description

XEN was updated to fix various bugs and security issues.

Security issues fixed :

- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation

- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts

- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation

- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram

- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load

- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests

- bnc#878841 - CVE-2014-3967,CVE-2014-3968: XSA-96:
Vulnerabilities in HVM MSI injection

- bnc#867910 - CVE-2014-2599: XSA-89: HVMOP_set_mem_access is not preemptible

- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow

Other bugs fixed :

- bnc#896023 - Adjust xentop column layout

- bnc#891539 - xend: fix netif convertToDeviceNumber for running domains

- bnc#820873 - The 'long' option doesn't work with 'xl list'

- bnc#881900 - XEN kernel panic do_device_not_available()

- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error 'No memory for trampoline'

- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released

- bnc#858178 - [HP HPS Bug]: SLES11sp3 XEN kiso version cause softlockup on 8 blades npar(480 cpu)

- bnc#865682 - Local attach support for PHY backends using scripts

- bnc#798770 - Improve multipath support for npiv devices

Solution

Update the affected xen packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=798770

https://bugzilla.novell.com/show_bug.cgi?id=820873

https://bugzilla.novell.com/show_bug.cgi?id=833483

https://bugzilla.novell.com/show_bug.cgi?id=842006

https://bugzilla.novell.com/show_bug.cgi?id=858178

https://bugzilla.novell.com/show_bug.cgi?id=862608

https://bugzilla.novell.com/show_bug.cgi?id=864801

https://bugzilla.novell.com/show_bug.cgi?id=865682

https://bugzilla.novell.com/show_bug.cgi?id=867910

https://bugzilla.novell.com/show_bug.cgi?id=878841

https://bugzilla.novell.com/show_bug.cgi?id=880751

https://bugzilla.novell.com/show_bug.cgi?id=881900

https://bugzilla.novell.com/show_bug.cgi?id=891539

https://bugzilla.novell.com/show_bug.cgi?id=895798

https://bugzilla.novell.com/show_bug.cgi?id=895799

https://bugzilla.novell.com/show_bug.cgi?id=895802

https://bugzilla.novell.com/show_bug.cgi?id=896023

https://bugzilla.novell.com/show_bug.cgi?id=897657

https://lists.opensuse.org/opensuse-updates/2014-10/msg00008.html

Plugin Details

Severity: High

ID: 78116

File Name: openSUSE-2014-579.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/10/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 6

CVSS v2.0

Base Score: 8.3

Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-doc-pdf, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 10/1/2014

Reference Information

CVE: CVE-2013-4344, CVE-2013-4540, CVE-2014-2599, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7154, CVE-2014-7155, CVE-2014-7156, CVE-2014-7188