openSUSE Security Update : xen (openSUSE-2017-329)

High Nessus Plugin ID 97712

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.1

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for xen fixes several issues.

These security issues were fixed :

- CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834).

- CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004).

- A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871)

- CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169

These non-security issues were fixed :

- bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3

- bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd

- bsc#1005028: Fixed building Xen RPMs from Sources

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1000195

https://bugzilla.opensuse.org/show_bug.cgi?id=1002496

https://bugzilla.opensuse.org/show_bug.cgi?id=1005028

https://bugzilla.opensuse.org/show_bug.cgi?id=1012651

https://bugzilla.opensuse.org/show_bug.cgi?id=1014298

https://bugzilla.opensuse.org/show_bug.cgi?id=1014300

https://bugzilla.opensuse.org/show_bug.cgi?id=1015169

https://bugzilla.opensuse.org/show_bug.cgi?id=1016340

https://bugzilla.opensuse.org/show_bug.cgi?id=1022871

https://bugzilla.opensuse.org/show_bug.cgi?id=1023004

https://bugzilla.opensuse.org/show_bug.cgi?id=1024834

Plugin Details

Severity: High

ID: 97712

File Name: openSUSE-2017-329.nasl

Version: 3.7

Type: local

Agent: unix

Published: 2017/03/14

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 8.1

CVSS v2.0

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/03/11

Reference Information

CVE: CVE-2016-9921, CVE-2016-9922, CVE-2017-2615, CVE-2017-2620

IAVB: 2017-B-0024