Description: | Summary: The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1710-1 advisory.
Vulnerability Insight: xen was updated to fix 14 security issues:
* Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030). * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the hypervisor (CVE-2014-8867). * Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation (CVE-2014-7155). * Hypervisor heap contents leaked to guests (CVE-2014-4021). * Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). * Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594). * Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts (CVE-2013-3495). * Missing privilege level checks in x86 emulation of software interrupts (CVE-2014-7156). * Race condition in HVMOP_track_dirty_vram (CVE-2014-7154). * Improper MSR range used for x2APIC emulation (CVE-2014-7188). * HVMOP_set_mem_type allows invalid P2M entries to be created (CVE-2014-3124). * HVMOP_set_mem_access is not preemptible (CVE-2014-2599). * Excessive checking in compatibility mode hypercall argument translation (CVE-2014-8866). * Guest user mode triggerable VM exits not handled by hypervisor (bnc#903850).
This non-security bug was fixed:
* Increase limit domUloader to 32MB (bnc#901317).
Security Issues:
* CVE-2014-9030 * CVE-2014-8867 * CVE-2014-7155 * CVE-2014-4021 * CVE-2014-8595 * CVE-2014-8594 * CVE-2013-3495 * CVE-2014-7156 * CVE-2014-7154 * CVE-2014-7188 * CVE-2014-3124 * CVE-2014-2599 * CVE-2014-8866Special Instructions and Notes: Please reboot the system after installing this update.
Affected Software/OS: 'xen' package(s) on SUSE Linux Enterprise Server 11-SP2.
Solution: Please install the updated package(s).
CVSS Score: 8.3
CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
|