openSUSE Security Update : xen (openSUSE-SU-2014:1279-1)

high Nessus Plugin ID 78116

Synopsis

The remote openSUSE host is missing a security update.

Description

XEN was updated to fix various bugs and security issues.

Security issues fixed :

- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation

- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts

- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation

- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram

- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load

- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests

- bnc#878841 - CVE-2014-3967,CVE-2014-3968: XSA-96:
Vulnerabilities in HVM MSI injection

- bnc#867910 - CVE-2014-2599: XSA-89: HVMOP_set_mem_access is not preemptible

- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow

Other bugs fixed :

- bnc#896023 - Adjust xentop column layout

- bnc#891539 - xend: fix netif convertToDeviceNumber for running domains

- bnc#820873 - The 'long' option doesn't work with 'xl list'

- bnc#881900 - XEN kernel panic do_device_not_available()

- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error 'No memory for trampoline'

- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released

- bnc#858178 - [HP HPS Bug]: SLES11sp3 XEN kiso version cause softlockup on 8 blades npar(480 cpu)

- bnc#865682 - Local attach support for PHY backends using scripts

- bnc#798770 - Improve multipath support for npiv devices

Solution

Update the affected xen packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=798770

https://bugzilla.novell.com/show_bug.cgi?id=820873

https://bugzilla.novell.com/show_bug.cgi?id=833483

https://bugzilla.novell.com/show_bug.cgi?id=842006

https://bugzilla.novell.com/show_bug.cgi?id=858178

https://bugzilla.novell.com/show_bug.cgi?id=862608

https://bugzilla.novell.com/show_bug.cgi?id=864801

https://bugzilla.novell.com/show_bug.cgi?id=865682

https://bugzilla.novell.com/show_bug.cgi?id=867910

https://bugzilla.novell.com/show_bug.cgi?id=878841

https://bugzilla.novell.com/show_bug.cgi?id=880751

https://bugzilla.novell.com/show_bug.cgi?id=881900

https://bugzilla.novell.com/show_bug.cgi?id=891539

https://bugzilla.novell.com/show_bug.cgi?id=895798

https://bugzilla.novell.com/show_bug.cgi?id=895799

https://bugzilla.novell.com/show_bug.cgi?id=895802

https://bugzilla.novell.com/show_bug.cgi?id=896023

https://bugzilla.novell.com/show_bug.cgi?id=897657

https://lists.opensuse.org/opensuse-updates/2014-10/msg00008.html

Plugin Details

Severity: High

ID: 78116

File Name: openSUSE-2014-579.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/10/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: High

Base Score: 8.3

Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-doc-pdf, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 10/1/2014

Reference Information

CVE: CVE-2013-4344, CVE-2013-4540, CVE-2014-2599, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7154, CVE-2014-7155, CVE-2014-7156, CVE-2014-7188