Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2014.1700.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:1700-1)
Summary:The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2014:1700-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2014:1700-1 advisory.

Vulnerability Insight:
Xen has been updated to version 4.2.5 with additional patches to fix six security issues:

* Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
(CVE-2014-9030).
* Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
hypervisor (CVE-2014-8867).
* Excessive checking in compatibility mode hypercall argument
translation (CVE-2014-8866).
* Guest user mode triggerable VM exits not handled by hypervisor
(bnc#903850).
* Missing privilege level checks in x86 emulation of far branches
(CVE-2014-8595).
* Insufficient restrictions on certain MMU update hypercalls
(CVE-2014-8594).

These non-security issues have been fixed:

* Xen save/restore of HVM guests cuts off disk and networking
(bnc#866902).
* Windows 2012 R2 fails to boot up with greater than 60 vcpus
(bnc#882089).
* Increase limit domUloader to 32MB (bnc#901317).
* Adjust xentop column layout (bnc#896023).

Security Issues:

* CVE-2014-9030
* CVE-2014-8867
* CVE-2014-8866
* CVE-2014-8595
* CVE-2014-8594Special Instructions and Notes:
Please reboot the system after installing this update.

Affected Software/OS:
'Xen' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP3.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-8594
BugTraq ID: 71149
http://www.securityfocus.com/bid/71149
Debian Security Information: DSA-3140 (Google Search)
http://www.debian.org/security/2015/dsa-3140
https://security.gentoo.org/glsa/201504-04
http://secunia.com/advisories/62672
SuSE Security Announcement: openSUSE-SU-2015:0226 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
SuSE Security Announcement: openSUSE-SU-2015:0256 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
XForce ISS Database: xen-cve20148594-sec-byass(98767)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98767
Common Vulnerability Exposure (CVE) ID: CVE-2014-8595
BugTraq ID: 71151
http://www.securityfocus.com/bid/71151
http://secunia.com/advisories/62537
XForce ISS Database: xen-cve20148595-priv-esc(98768)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98768
Common Vulnerability Exposure (CVE) ID: CVE-2014-8866
BugTraq ID: 71332
http://www.securityfocus.com/bid/71332
http://secunia.com/advisories/59937
Common Vulnerability Exposure (CVE) ID: CVE-2014-8867
BugTraq ID: 71331
http://www.securityfocus.com/bid/71331
RedHat Security Advisories: RHSA-2015:0783
http://rhn.redhat.com/errata/RHSA-2015-0783.html
http://secunia.com/advisories/59949
Common Vulnerability Exposure (CVE) ID: CVE-2014-9030
BugTraq ID: 71207
http://www.securityfocus.com/bid/71207
XForce ISS Database: xen-mmumachphysupdate-dos(98853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98853
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.