openSUSE Security Update : xen (openSUSE-SU-2014:1281-1)

high Nessus Plugin ID 78117
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

XEN was updated to fix security issues and bugs.

Security issues fixed :

- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation

- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts

- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation

- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram

- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load

- bnc#875668 - CVE-2014-3124: XSA-92: HVMOP_set_mem_type allows invalid P2M entries to be created

- bnc#878841 - CVE-2014-3967, CVE-2014-3968: XSA-96: Xen:
Vulnerabilities in HVM MSI injection

- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests

- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow

Other bugs fixed :

- bnc#896023 - Adjust xentop column layout

- bnc#820873 - The 'long' option doesn't work with 'xl list'

- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8

- bnc#865682 - Local attach support for PHY backends using scripts

- bnc#798770 - Improve multipath support for npiv devices

Solution

Update the affected xen packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=798770

https://bugzilla.novell.com/show_bug.cgi?id=820873

https://bugzilla.novell.com/show_bug.cgi?id=842006

https://bugzilla.novell.com/show_bug.cgi?id=864801

https://bugzilla.novell.com/show_bug.cgi?id=865682

https://bugzilla.novell.com/show_bug.cgi?id=875668

https://bugzilla.novell.com/show_bug.cgi?id=878841

https://bugzilla.novell.com/show_bug.cgi?id=880751

https://bugzilla.novell.com/show_bug.cgi?id=882127

https://bugzilla.novell.com/show_bug.cgi?id=895798

https://bugzilla.novell.com/show_bug.cgi?id=895799

https://bugzilla.novell.com/show_bug.cgi?id=895802

https://bugzilla.novell.com/show_bug.cgi?id=896023

https://bugzilla.novell.com/show_bug.cgi?id=897657

https://lists.opensuse.org/opensuse-updates/2014-10/msg00010.html

Plugin Details

Severity: High

ID: 78117

File Name: openSUSE-2014-580.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/10/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: High

Base Score: 8.3

Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools, p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 10/1/2014

Reference Information

CVE: CVE-2013-4344, CVE-2013-4540, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7154, CVE-2014-7155, CVE-2014-7156, CVE-2014-7188