Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2014.0373.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:0373-1)
Summary:The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2014:0373-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2014:0373-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

*

XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling chaches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
(bnc#831120)

*

XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors. (bnc#853048)

*

XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue. (bnc#853049)

*

XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free. (bnc#860092)

*

XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL,
FLASK_USER and FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are vulnerable to an integer overflow on the input size. The hypercalls attempt to allocate a buffer which is 1 larger than this size and is therefore vulnerable to integer overflow and an attempt to allocate then access a zero byte buffer. (bnc#860163)

*

XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not affected by the above overflow, have a different overflow issue on FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation to aribitrary guests.
(bnc#860163)

*

XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both problems with the overflow issue being present for more than just the suboperations listed above. (bnc#860163)

*

XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which provides access to per-cpu statistics on the Flask security policy, incorrectly validates the CPU for which statistics are being requested. (bnc#860165)

*

XSA-86: CVE-2014-1896: libvchan (a library for inter-domain communication) does not correctly handle unusual or malicious contents in the xenstore ring. A malicious guest can exploit this to cause a libvchan-using facility ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Xen' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-2212
GLSA-201504-04
https://security.gentoo.org/glsa/201504-04
SUSE-SU-2014:0372
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
SUSE-SU-2014:0373
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
SUSE-SU-2014:0446
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
[oss-security] 20130724 Xen Security Advisory 60 (CVE-2013-2212) - Excessive time to disable caching with HVM guests with PCI passthrough
http://www.openwall.com/lists/oss-security/2013/07/24/6
Common Vulnerability Exposure (CVE) ID: CVE-2013-6400
1029468
http://www.securitytracker.com/id/1029468
55932
http://secunia.com/advisories/55932
FEDORA-2013-23457
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125111.html
FEDORA-2013-23466
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125081.html
GLSA-201407-03
http://security.gentoo.org/glsa/glsa-201407-03.xml
[Xen-announce] 20131210 Xen Security Advisory 80 (CVE-2013-6400) - IOMMU TLB flushing may be inadvertently suppressed
http://lists.xen.org/archives/html/xen-announce/2013-12/msg00002.html
[oss-security] 20131210 Xen Security Advisory 80 (CVE-2013-6400) - IOMMU TLB flushing may be inadvertently suppressed
http://www.openwall.com/lists/oss-security/2013/12/10/7
Common Vulnerability Exposure (CVE) ID: CVE-2013-6885
1029415
http://www.securitytracker.com/id/1029415
55840
http://secunia.com/advisories/55840
63983
http://www.securityfocus.com/bid/63983
DSA-3128
http://www.debian.org/security/2015/dsa-3128
FEDORA-2013-22754
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
FEDORA-2013-22866
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
FEDORA-2013-22888
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
RHSA-2014:0285
http://rhn.redhat.com/errata/RHSA-2014-0285.html
SUSE-SU-2014:0411
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
SUSE-SU-2014:0459
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
SUSE-SU-2014:0470
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
[kernel] 20111225 Buildworld loop seg-fault update -- I believe it is hardware
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
[oss-security] 20131127 CVE-2013-6885 AMD Publ. 51810 Errata 793 system hang
http://openwall.com/lists/oss-security/2013/11/28/1
[oss-security] 20131202 Xen Security Advisory 82 (CVE-2013-6885) - Guest triggerable AMD CPU erratum may cause host to hang
http://www.openwall.com/lists/oss-security/2013/12/02/1
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
https://bugzilla.redhat.com/show_bug.cgi?id=1035823
xen-cve20136885-dos(89335)
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
Common Vulnerability Exposure (CVE) ID: CVE-2014-1642
BugTraq ID: 65097
http://www.securityfocus.com/bid/65097
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127607.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127580.html
http://www.openwall.com/lists/oss-security/2014/01/23/4
http://osvdb.org/102406
http://www.securitytracker.com/id/1029679
http://secunia.com/advisories/56557
SuSE Security Announcement: SUSE-SU-2014:0373 (Google Search)
XForce ISS Database: xen-irq-cve20141642-code-exec(90649)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90649
Common Vulnerability Exposure (CVE) ID: CVE-2014-1666
BugTraq ID: 65125
http://www.securityfocus.com/bid/65125
http://xenbits.xen.org/xsa/xsa87-unstable-4.3.patch
http://www.openwall.com/lists/oss-security/2014/01/24/6
http://osvdb.org/102536
http://www.securitytracker.com/id/1029684
http://secunia.com/advisories/56650
SuSE Security Announcement: SUSE-SU-2014:0372 (Google Search)
XForce ISS Database: xen-cve20141666-priv-esc(90675)
https://exchange.xforce.ibmcloud.com/vulnerabilities/90675
Common Vulnerability Exposure (CVE) ID: CVE-2014-1891
http://www.openwall.com/lists/oss-security/2014/02/07/12
http://www.openwall.com/lists/oss-security/2014/02/07/4
http://www.openwall.com/lists/oss-security/2014/02/10/8
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1892
Common Vulnerability Exposure (CVE) ID: CVE-2014-1893
Common Vulnerability Exposure (CVE) ID: CVE-2014-1894
Common Vulnerability Exposure (CVE) ID: CVE-2014-1895
http://www.openwall.com/lists/oss-security/2014/02/10/6
Common Vulnerability Exposure (CVE) ID: CVE-2014-1896
http://www.openwall.com/lists/oss-security/2014/02/10/7
Common Vulnerability Exposure (CVE) ID: CVE-2014-1950
Debian Security Information: DSA-3006 (Google Search)
http://www.debian.org/security/2014/dsa-3006
http://www.openwall.com/lists/oss-security/2014/02/12/17
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.