Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2014.1710.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:1710-1)
Summary:The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1710-1 advisory.
Description:Summary:
The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1710-1 advisory.

Vulnerability Insight:
xen was updated to fix 14 security issues:

* Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
(CVE-2014-9030).
* Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
hypervisor (CVE-2014-8867).
* Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW
emulation (CVE-2014-7155).
* Hypervisor heap contents leaked to guests (CVE-2014-4021).
* Missing privilege level checks in x86 emulation of far branches
(CVE-2014-8595).
* Insufficient restrictions on certain MMU update hypercalls
(CVE-2014-8594).
* Intel VT-d Interrupt Remapping engines can be evaded by native NMI
interrupts (CVE-2013-3495).
* Missing privilege level checks in x86 emulation of software
interrupts (CVE-2014-7156).
* Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
* Improper MSR range used for x2APIC emulation (CVE-2014-7188).
* HVMOP_set_mem_type allows invalid P2M entries to be created
(CVE-2014-3124).
* HVMOP_set_mem_access is not preemptible (CVE-2014-2599).
* Excessive checking in compatibility mode hypercall argument
translation (CVE-2014-8866).
* Guest user mode triggerable VM exits not handled by hypervisor
(bnc#903850).

This non-security bug was fixed:

* Increase limit domUloader to 32MB (bnc#901317).

Security Issues:

* CVE-2014-9030
* CVE-2014-8867
* CVE-2014-7155
* CVE-2014-4021
* CVE-2014-8595
* CVE-2014-8594
* CVE-2013-3495
* CVE-2014-7156
* CVE-2014-7154
* CVE-2014-7188
* CVE-2014-3124
* CVE-2014-2599
* CVE-2014-8866Special Instructions and Notes:
Please reboot the system after installing this update.

Affected Software/OS:
'xen' package(s) on SUSE Linux Enterprise Server 11-SP2.

Solution:
Please install the updated package(s).

CVSS Score:
8.3

CVSS Vector:
AV:A/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-3495
BugTraq ID: 61854
http://www.securityfocus.com/bid/61854
https://security.gentoo.org/glsa/201504-04
http://www.openwall.com/lists/oss-security/2013/08/20/8
http://osvdb.org/96438
http://www.securitytracker.com/id/1028931
http://secunia.com/advisories/54341
SuSE Security Announcement: openSUSE-SU-2015:0226 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
SuSE Security Announcement: openSUSE-SU-2015:0256 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-2599
BugTraq ID: 66407
http://www.securityfocus.com/bid/66407
Debian Security Information: DSA-3006 (Google Search)
http://www.debian.org/security/2014/dsa-3006
http://security.gentoo.org/glsa/glsa-201407-03.xml
http://www.openwall.com/lists/oss-security/2014/03/25/2
http://www.openwall.com/lists/oss-security/2014/03/25/1
http://www.securitytracker.com/id/1029956
SuSE Security Announcement: openSUSE-SU-2014:1279 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-3124
BugTraq ID: 67113
http://www.securityfocus.com/bid/67113
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133148.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133191.html
http://www.openwall.com/lists/oss-security/2014/04/29/1
http://www.openwall.com/lists/oss-security/2014/04/30/10
http://www.securitytracker.com/id/1030160
SuSE Security Announcement: openSUSE-SU-2014:1281 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-4021
BugTraq ID: 68070
http://www.securityfocus.com/bid/68070
http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html
http://www.securitytracker.com/id/1030442
http://secunia.com/advisories/59208
http://secunia.com/advisories/60027
http://secunia.com/advisories/60130
http://secunia.com/advisories/60471
Common Vulnerability Exposure (CVE) ID: CVE-2014-7154
Debian Security Information: DSA-3041 (Google Search)
http://www.debian.org/security/2014/dsa-3041
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html
http://security.gentoo.org/glsa/glsa-201412-42.xml
http://www.securitytracker.com/id/1030887
http://secunia.com/advisories/61501
http://secunia.com/advisories/61890
Common Vulnerability Exposure (CVE) ID: CVE-2014-7155
BugTraq ID: 70057
http://www.securityfocus.com/bid/70057
http://www.securitytracker.com/id/1030888
http://secunia.com/advisories/61858
Common Vulnerability Exposure (CVE) ID: CVE-2014-7156
BugTraq ID: 70062
http://www.securityfocus.com/bid/70062
http://www.securitytracker.com/id/1030889
http://secunia.com/advisories/61500
Common Vulnerability Exposure (CVE) ID: CVE-2014-7188
BugTraq ID: 70198
http://www.securityfocus.com/bid/70198
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140199.html
http://www.c7zero.info/stuff/csw2017_ExploringYourSystemDeeper_updated.pdf
http://www.securitytracker.com/id/1030936
http://secunia.com/advisories/61664
XForce ISS Database: xen-cve20147188-dos(96785)
https://exchange.xforce.ibmcloud.com/vulnerabilities/96785
Common Vulnerability Exposure (CVE) ID: CVE-2014-8594
BugTraq ID: 71149
http://www.securityfocus.com/bid/71149
Debian Security Information: DSA-3140 (Google Search)
http://www.debian.org/security/2015/dsa-3140
http://secunia.com/advisories/62672
XForce ISS Database: xen-cve20148594-sec-byass(98767)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98767
Common Vulnerability Exposure (CVE) ID: CVE-2014-8595
BugTraq ID: 71151
http://www.securityfocus.com/bid/71151
http://secunia.com/advisories/62537
XForce ISS Database: xen-cve20148595-priv-esc(98768)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98768
Common Vulnerability Exposure (CVE) ID: CVE-2014-8866
BugTraq ID: 71332
http://www.securityfocus.com/bid/71332
http://secunia.com/advisories/59937
Common Vulnerability Exposure (CVE) ID: CVE-2014-8867
BugTraq ID: 71331
http://www.securityfocus.com/bid/71331
RedHat Security Advisories: RHSA-2015:0783
http://rhn.redhat.com/errata/RHSA-2015-0783.html
http://secunia.com/advisories/59949
Common Vulnerability Exposure (CVE) ID: CVE-2014-9030
BugTraq ID: 71207
http://www.securityfocus.com/bid/71207
XForce ISS Database: xen-mmumachphysupdate-dos(98853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/98853
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.