openSUSE Security Update : xen (openSUSE-SU-2014:1281-1)

high Nessus Plugin ID 78117
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6

Synopsis

The remote openSUSE host is missing a security update.

Description

XEN was updated to fix security issues and bugs.

Security issues fixed :

- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation

- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts

- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation

- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram

- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load

- bnc#875668 - CVE-2014-3124: XSA-92: HVMOP_set_mem_type allows invalid P2M entries to be created

- bnc#878841 - CVE-2014-3967, CVE-2014-3968: XSA-96: Xen:
Vulnerabilities in HVM MSI injection

- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests

- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow

Other bugs fixed :

- bnc#896023 - Adjust xentop column layout

- bnc#820873 - The 'long' option doesn't work with 'xl list'

- bnc#882127 - Xen kernel panics on booting SLES12 Beta 8

- bnc#865682 - Local attach support for PHY backends using scripts

- bnc#798770 - Improve multipath support for npiv devices

Solution

Update the affected xen packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=798770

https://bugzilla.novell.com/show_bug.cgi?id=820873

https://bugzilla.novell.com/show_bug.cgi?id=842006

https://bugzilla.novell.com/show_bug.cgi?id=864801

https://bugzilla.novell.com/show_bug.cgi?id=865682

https://bugzilla.novell.com/show_bug.cgi?id=875668

https://bugzilla.novell.com/show_bug.cgi?id=878841

https://bugzilla.novell.com/show_bug.cgi?id=880751

https://bugzilla.novell.com/show_bug.cgi?id=882127

https://bugzilla.novell.com/show_bug.cgi?id=895798

https://bugzilla.novell.com/show_bug.cgi?id=895799

https://bugzilla.novell.com/show_bug.cgi?id=895802

https://bugzilla.novell.com/show_bug.cgi?id=896023

https://bugzilla.novell.com/show_bug.cgi?id=897657

https://lists.opensuse.org/opensuse-updates/2014-10/msg00010.html

Plugin Details

Severity: High

ID: 78117

File Name: openSUSE-2014-580.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/10/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 6

CVSS v2.0

Base Score: 8.3

Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools, p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 10/1/2014

Reference Information

CVE: CVE-2013-4344, CVE-2013-4540, CVE-2014-3124, CVE-2014-3967, CVE-2014-3968, CVE-2014-4021, CVE-2014-7154, CVE-2014-7155, CVE-2014-7156, CVE-2014-7188