Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.850773
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory for Xen (SUSE-SU-2014:0373-1)
Summary:The remote host is missing an update for the 'Xen'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'Xen'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The SUSE Linux Enterprise Server 11 Service Pack 3 Xen
hypervisor and toolset has been updated to 4.2.4 to fix
various bugs and security issues:

The following security issues have been addressed:

*

XSA-60: CVE-2013-2212: The vmx_set_uc_mode function
in Xen 3.3 through 4.3, when disabling caches, allows
local HVM guests with access to memory mapped I/O regions
to cause a denial of service (CPU consumption and possibly
hypervisor or guest kernel panic) via a crafted GFN range.
(bnc#831120)

*

XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when
using Intel VT-d and a PCI device has been assigned, does
not clear the flag that suppresses IOMMU TLB flushes when
unspecified errors occur, which causes the TLB entries to
not be flushed and allows local guest administrators to
cause a denial of service (host crash) or gain privileges
via unspecified vectors. (bnc#853048)

*

XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h
through 0Fh processors does not properly handle the
interaction between locked instructions and write-combined
memory types, which allows local users to cause a denial of
service (system hang) via a crafted application, aka the
errata 793 issue. (bnc#853049)

*

XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and
4.3.x, when using device passthrough and configured to
support a large number of CPUs, frees certain memory that
may still be intended for use, which allows local guest
administrators to cause a denial of service (memory
corruption and hypervisor crash) and possibly execute
arbitrary code via vectors related to an out-of-memory
error that triggers a (1) use-after-free or (2) double
free. (bnc#860092)

*

XSA-84: CVE-2014-1891: The FLASK_{GET, SET}BOOL,
FLASK_USER and FLASK_CONTEXT_TO_SID suboperations of the
flask hypercall are vulnerable to an integer overflow on
the input size. The hypercalls attempt to allocate a buffer
which is 1 larger than this size and is therefore
vulnerable to integer overflow and an attempt to allocate
then access a zero byte buffer. (bnc#860163)

*

XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through
4.1, while not affected by the above overflow, have a
different overflow issue on FLASK_{GET, SET}BOOL and expose
unreasonably large memory allocation to arbitrary guests.
(bnc#860163)

*

XSA-84: CVE-2014-1894: Xen 3.2 (and presumably
earlier) exhibit both problems with the overflow issue
being present for more than just the suboperations listed
above. (bnc#860163)

*

XSA-85: CVE-2014-1895: The FLASK_AVC_CACHE ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Xen on SUSE Linux Enterprise Server 11 SP3

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-2212
GLSA-201504-04
https://security.gentoo.org/glsa/201504-04
SUSE-SU-2014:0372
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
SUSE-SU-2014:0373
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
SUSE-SU-2014:0446
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
[oss-security] 20130724 Xen Security Advisory 60 (CVE-2013-2212) - Excessive time to disable caching with HVM guests with PCI passthrough
http://www.openwall.com/lists/oss-security/2013/07/24/6
Common Vulnerability Exposure (CVE) ID: CVE-2013-6400
1029468
http://www.securitytracker.com/id/1029468
55932
http://secunia.com/advisories/55932
FEDORA-2013-23457
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125111.html
FEDORA-2013-23466
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125081.html
GLSA-201407-03
http://security.gentoo.org/glsa/glsa-201407-03.xml
[Xen-announce] 20131210 Xen Security Advisory 80 (CVE-2013-6400) - IOMMU TLB flushing may be inadvertently suppressed
http://lists.xen.org/archives/html/xen-announce/2013-12/msg00002.html
[oss-security] 20131210 Xen Security Advisory 80 (CVE-2013-6400) - IOMMU TLB flushing may be inadvertently suppressed
http://www.openwall.com/lists/oss-security/2013/12/10/7
Common Vulnerability Exposure (CVE) ID: CVE-2013-6885
1029415
http://www.securitytracker.com/id/1029415
55840
http://secunia.com/advisories/55840
63983
http://www.securityfocus.com/bid/63983
DSA-3128
http://www.debian.org/security/2015/dsa-3128
FEDORA-2013-22754
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
FEDORA-2013-22866
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
FEDORA-2013-22888
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
RHSA-2014:0285
http://rhn.redhat.com/errata/RHSA-2014-0285.html
SUSE-SU-2014:0411
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
SUSE-SU-2014:0459
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
SUSE-SU-2014:0470
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
[kernel] 20111225 Buildworld loop seg-fault update -- I believe it is hardware
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
[oss-security] 20131127 CVE-2013-6885 AMD Publ. 51810 Errata 793 system hang
http://openwall.com/lists/oss-security/2013/11/28/1
[oss-security] 20131202 Xen Security Advisory 82 (CVE-2013-6885) - Guest triggerable AMD CPU erratum may cause host to hang
http://www.openwall.com/lists/oss-security/2013/12/02/1
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
https://bugzilla.redhat.com/show_bug.cgi?id=1035823
xen-cve20136885-dos(89335)
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
Common Vulnerability Exposure (CVE) ID: CVE-2014-1642
BugTraq ID: 65097
http://www.securityfocus.com/bid/65097
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127607.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127580.html
http://www.openwall.com/lists/oss-security/2014/01/23/4
http://osvdb.org/102406
http://www.securitytracker.com/id/1029679
http://secunia.com/advisories/56557
SuSE Security Announcement: SUSE-SU-2014:0373 (Google Search)
XForce ISS Database: xen-irq-cve20141642-code-exec(90649)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90649
Common Vulnerability Exposure (CVE) ID: CVE-2014-1666
BugTraq ID: 65125
http://www.securityfocus.com/bid/65125
http://xenbits.xen.org/xsa/xsa87-unstable-4.3.patch
http://www.openwall.com/lists/oss-security/2014/01/24/6
http://osvdb.org/102536
http://www.securitytracker.com/id/1029684
http://secunia.com/advisories/56650
SuSE Security Announcement: SUSE-SU-2014:0372 (Google Search)
XForce ISS Database: xen-cve20141666-priv-esc(90675)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90675
Common Vulnerability Exposure (CVE) ID: CVE-2014-1891
http://www.openwall.com/lists/oss-security/2014/02/07/12
http://www.openwall.com/lists/oss-security/2014/02/07/4
http://www.openwall.com/lists/oss-security/2014/02/10/8
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1892
Common Vulnerability Exposure (CVE) ID: CVE-2014-1893
Common Vulnerability Exposure (CVE) ID: CVE-2014-1894
Common Vulnerability Exposure (CVE) ID: CVE-2014-1895
http://www.openwall.com/lists/oss-security/2014/02/10/6
Common Vulnerability Exposure (CVE) ID: CVE-2014-1896
http://www.openwall.com/lists/oss-security/2014/02/10/7
Common Vulnerability Exposure (CVE) ID: CVE-2014-1950
Debian Security Information: DSA-3006 (Google Search)
http://www.debian.org/security/2014/dsa-3006
http://www.openwall.com/lists/oss-security/2014/02/12/17
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.