openSUSE Security Update : xen (openSUSE-2016-34)

high Nessus Plugin ID 88124

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for xen fixes the following security issues :

- CVE-2015-8550: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988)

- CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006)

- CVE-2015-7549: qemu pci: NULL pointer dereference issue (boo#958918)

- CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493)

- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007)

- CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009)

- boo#958523 xen: ioreq handling possibly susceptible to multiple read issue (XSA-166)

- CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832)

- boo#956592: xen: virtual PMU is unsupported (XSA-163)

- CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408)

- CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409)

- CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411)

- CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142, boo#947165)

- CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception (boo#954405)

- CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018)

- CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150, boo#950704)

Solution

Update the affected xen packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=947165

https://bugzilla.opensuse.org/show_bug.cgi?id=950704

https://bugzilla.opensuse.org/show_bug.cgi?id=954018

https://bugzilla.opensuse.org/show_bug.cgi?id=954405

https://bugzilla.opensuse.org/show_bug.cgi?id=956408

https://bugzilla.opensuse.org/show_bug.cgi?id=956409

https://bugzilla.opensuse.org/show_bug.cgi?id=956411

https://bugzilla.opensuse.org/show_bug.cgi?id=956592

https://bugzilla.opensuse.org/show_bug.cgi?id=956832

https://bugzilla.opensuse.org/show_bug.cgi?id=957988

https://bugzilla.opensuse.org/show_bug.cgi?id=958007

https://bugzilla.opensuse.org/show_bug.cgi?id=958009

https://bugzilla.opensuse.org/show_bug.cgi?id=958493

https://bugzilla.opensuse.org/show_bug.cgi?id=958523

https://bugzilla.opensuse.org/show_bug.cgi?id=958918

https://bugzilla.opensuse.org/show_bug.cgi?id=959006

Plugin Details

Severity: High

ID: 88124

File Name: openSUSE-2016-34.nasl

Version: 2.5

Type: local

Agent: unix

Published: 1/25/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domu-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-xend-tools, p-cpe:/a:novell:opensuse:xen-tools-domu, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-kmp-default, cpe:/o:novell:opensuse:13.1, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-kmp-desktop

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 1/14/2016

Reference Information

CVE: CVE-2015-5307, CVE-2015-7311, CVE-2015-7504, CVE-2015-7549, CVE-2015-7970, CVE-2015-8104, CVE-2015-8339, CVE-2015-8340, CVE-2015-8341, CVE-2015-8345, CVE-2015-8504, CVE-2015-8550, CVE-2015-8554, CVE-2015-8555, CVE-2015-8558