openSUSE Security Update : xen (openSUSE-2018-547) (Spectre)

high Nessus Plugin ID 110309

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for xen fixes the following issues :

Security issues fixed :

- CVE-2018-3639: Spectre V4 – Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092631)

This feature can be controlled by the 'ssbd=on/off' commandline flag for the XEN hypervisor.

- CVE-2018-10982: x86 vHPET interrupt injection errors (XSA-261 bsc#1090822)

- CVE-2018-10981: qemu may drive Xen into unbounded loop (XSA-262 bsc#1090823)

Other bugfixes :

- Upstream patches from Jan (bsc#1027519)

- additional fixes related to Page Table Isolation (XPTI).
(bsc#1074562 XSA-254)

- qemu-system-i386 cannot handle more than 4 HW NICs (bsc#1090296)

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1027519

https://bugzilla.opensuse.org/show_bug.cgi?id=1074562

https://bugzilla.opensuse.org/show_bug.cgi?id=1090296

https://bugzilla.opensuse.org/show_bug.cgi?id=1090822

https://bugzilla.opensuse.org/show_bug.cgi?id=1090823

https://bugzilla.opensuse.org/show_bug.cgi?id=1092631

Plugin Details

Severity: High

ID: 110309

File Name: openSUSE-2018-547.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/4/2018

Updated: 9/26/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-10982

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo, p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-tools, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/1/2018

Reference Information

CVE: CVE-2018-10981, CVE-2018-10982, CVE-2018-3639