OracleVM 3.4 : xen (OVMSA-2018-0251) (Foreshadow)

medium Nessus Plugin ID 112024

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- BUILDINFO: xen commit=18ec2b68e519646188fd26a05b2cd26ebd829035

- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- Revert 'xend: fix memory leak of XendConfig.XendConfig object' (Konrad Rzeszutek Wilk) [Orabug: 28506675]

- BUILDINFO: xen commit=7023729bcb7dd5c156bc8ee31a7971f036e43f66

- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- l1tf: Utility to offline/online SMT siblings. (Ross Philipson) [Orabug: 28487029] (CVE-2018-3646)

- x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM guests (Andrew Cooper) [Orabug: 28487029] (CVE-2018-3620) (CVE-2018-3646)

- x86/msr: Virtualise MSR_FLUSH_CMD for guests (Andrew Cooper) [Orabug: 28487029] (CVE-2018-3646) (CVE-2018-3646)

- x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH (Andrew Cooper) [Orabug: 28487029] (CVE-2018-3646) (CVE-2018-3646)

- x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations (Andrew Cooper) [Orabug: 28487029] (CVE-2018-3620) (CVE-2018-3646)

- x86: command line option to avoid use of secondary hyper-threads (Jan Beulich) [Orabug: 28487029] (CVE-2018-3646)

- cpupools: fix state when downing a CPU failed (Jan Beulich) [Orabug: 28487029] (CVE-2018-3646)

- BUILDINFO: xen commit=63c397f89da7c720208e599696ada989121f3698

- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend: fix memory leak of XendConfig.XendConfig object (Manjunath Patil) [Orabug: 28223470]

Solution

Update the affected xen / xen-tools packages.

See Also

http://www.nessus.org/u?bdcf73b7

Plugin Details

Severity: Medium

ID: 112024

File Name: oraclevm_OVMSA-2018-0251.nasl

Version: 1.5

Type: local

Published: 8/21/2018

Updated: 8/15/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.5

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2018-3646

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/21/2018

Vulnerability Publication Date: 8/14/2018

Reference Information

CVE: CVE-2018-3620, CVE-2018-3646