openSUSE Security Update : xen (openSUSE-2015-750)

High Nessus Plugin ID 86909

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.5

Synopsis

The remote openSUSE host is missing a security update.

Description

xen was updated to fix 12 security issues.

These security issues were fixed :

- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845).

- CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703).

- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705).

- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).

- CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642).

- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).

- CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165).

- CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712).

- CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709).

- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634).

These non-security issues were fixed :

- bsc#907514: Bus fatal error and sles12 sudden reboot has been observed

- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC

- bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been observed

- bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has been observed

- bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores

- bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show errors

- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort

- bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg()

- bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000:
infinite loop issue

- bsc#925466: Kdump does not work in a XEN environment

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=877642

https://bugzilla.opensuse.org/show_bug.cgi?id=901488

https://bugzilla.opensuse.org/show_bug.cgi?id=907514

https://bugzilla.opensuse.org/show_bug.cgi?id=910258

https://bugzilla.opensuse.org/show_bug.cgi?id=918984

https://bugzilla.opensuse.org/show_bug.cgi?id=923967

https://bugzilla.opensuse.org/show_bug.cgi?id=925466

https://bugzilla.opensuse.org/show_bug.cgi?id=932267

https://bugzilla.opensuse.org/show_bug.cgi?id=935634

https://bugzilla.opensuse.org/show_bug.cgi?id=938344

https://bugzilla.opensuse.org/show_bug.cgi?id=939709

https://bugzilla.opensuse.org/show_bug.cgi?id=939712

https://bugzilla.opensuse.org/show_bug.cgi?id=944463

https://bugzilla.opensuse.org/show_bug.cgi?id=944697

https://bugzilla.opensuse.org/show_bug.cgi?id=945167

https://bugzilla.opensuse.org/show_bug.cgi?id=947165

https://bugzilla.opensuse.org/show_bug.cgi?id=949138

https://bugzilla.opensuse.org/show_bug.cgi?id=950367

https://bugzilla.opensuse.org/show_bug.cgi?id=950703

https://bugzilla.opensuse.org/show_bug.cgi?id=950705

https://bugzilla.opensuse.org/show_bug.cgi?id=950706

https://bugzilla.opensuse.org/show_bug.cgi?id=951845

Plugin Details

Severity: High

ID: 86909

File Name: openSUSE-2015-750.nasl

Version: 2.3

Type: local

Agent: unix

Published: 2015/11/18

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.5

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2015/10/30

Vulnerability Publication Date: 2014/11/04

Reference Information

CVE: CVE-2014-0222, CVE-2015-3259, CVE-2015-4037, CVE-2015-5154, CVE-2015-5165, CVE-2015-5166, CVE-2015-5239, CVE-2015-6815, CVE-2015-7311, CVE-2015-7835, CVE-2015-7969, CVE-2015-7971, CVE-2015-7972