openSUSE Security Update : xen (openSUSE-2015-113)

high Nessus Plugin ID 81239

Synopsis

The remote openSUSE host is missing a security update.

Description

The virtualization software XEN was updated to version 4.3.3 and also to fix bugs and security issues.

Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to use after free on hvm guest teardown

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

CVE-2014-9030: XSA-113: Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling

CVE-2014-8867: XSA-112: xen: Insufficient bounding of 'REP MOVS' to MMIO emulated inside the hypervisor

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode hypercall argument translation

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86 emulation of far branches

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU update hypercalls

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible

Bugs fixed :

- bnc#903357 - Corrupted save/restore test leaves orphaned data in xenstore

- bnc#903359 - Temporary migration name is not cleaned up after migration

- bnc#903850 - VUL-0: Xen: guest user mode triggerable VM exits not handled by hypervisor

- bnc#866902 - L3: Xen save/restore of HVM guests cuts off disk and networking

- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus

- bsc#900292 - xl: change default dump directory

- Update to Xen 4.3.3

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=826717

https://bugzilla.opensuse.org/show_bug.cgi?id=866902

https://bugzilla.opensuse.org/show_bug.cgi?id=882089

https://bugzilla.opensuse.org/show_bug.cgi?id=889526

https://bugzilla.opensuse.org/show_bug.cgi?id=900292

https://bugzilla.opensuse.org/show_bug.cgi?id=901317

https://bugzilla.opensuse.org/show_bug.cgi?id=903357

https://bugzilla.opensuse.org/show_bug.cgi?id=903359

https://bugzilla.opensuse.org/show_bug.cgi?id=903850

https://bugzilla.opensuse.org/show_bug.cgi?id=903967

https://bugzilla.opensuse.org/show_bug.cgi?id=903970

https://bugzilla.opensuse.org/show_bug.cgi?id=905465

https://bugzilla.opensuse.org/show_bug.cgi?id=905467

https://bugzilla.opensuse.org/show_bug.cgi?id=906439

https://bugzilla.opensuse.org/show_bug.cgi?id=906996

https://bugzilla.opensuse.org/show_bug.cgi?id=910681

Plugin Details

Severity: High

ID: 81239

File Name: openSUSE-2015-113.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2/9/2015

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools, p-cpe:/a:novell:opensuse:xen-tools-domu, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-kmp-default, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-desktop

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 1/12/2015

Reference Information

CVE: CVE-2013-3495, CVE-2014-5146, CVE-2014-5149, CVE-2014-8594, CVE-2014-8595, CVE-2014-8866, CVE-2014-8867, CVE-2014-9030, CVE-2014-9065, CVE-2014-9066, CVE-2015-0361