OracleVM 3.3 : xen (OVMSA-2015-0141)

High Nessus Plugin ID 86669

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- x86: rate-limit logging in do_xen[oprof,pmu]_op Some of the sub-ops are acessible to all guests, and hence should be rate-limited. In the xenoprof case, just like for XSA-146, include them only in debug builds. Since the vPMU code is rather new, allow them to be always present, but downgrade them to (rate limited) guest messages. This is XSA-152. (CVE-2015-7971)

- xenoprof: free domain's vcpu array This was overlooked in fb442e2171 ('x86_64: allow more vCPU-s per guest').
This is XSA-151. (CVE-2015-7969)

- x86: guard against undue super page PTE creation When optional super page support got added (commit bd1cd81d64 'x86: PV support for hugepages'), two adjustments were missed: mod_l2_entry needs to consider the PSE and RW bits when deciding whether to use the fast path, and the PSE bit must not be removed from L2_DISALLOW_MASK unconditionally. This is XSA-148. (CVE-2015-7835)

Solution

Update the affected xen / xen-tools packages.

See Also

http://www.nessus.org/u?2dce5d78

Plugin Details

Severity: High

ID: 86669

File Name: oraclevm_OVMSA-2015-0141.nasl

Version: 2.6

Type: local

Published: 2015/10/30

Updated: 2019/09/27

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.3

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/10/29

Vulnerability Publication Date: 2015/10/30

Reference Information

CVE: CVE-2015-7835, CVE-2015-7969, CVE-2015-7971