Description: | Summary: The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1732-1 advisory.
Vulnerability Insight: xen was updated to fix 10 security issues:
* Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030). * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the hypervisor (CVE-2014-8867). * Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). * Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation (CVE-2014-7155). * Hypervisor heap contents leaked to guests (CVE-2014-4021). * Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). * Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594). * Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts (CVE-2013-3495). * Missing privilege level checks in x86 emulation of software interrupts (CVE-2014-7156). * Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
Security Issues:
* CVE-2014-9030 * CVE-2014-8867 * CVE-2014-8595 * CVE-2014-7155 * CVE-2014-4021 * CVE-2014-8595 * CVE-2014-8594 * CVE-2013-3495 * CVE-2014-7156 * CVE-2014-7154Special Instructions and Notes: Please reboot the system after installing this update.
Affected Software/OS: 'xen' package(s) on SUSE Linux Enterprise Server 11-SP1.
Solution: Please install the updated package(s).
CVSS Score: 7.1
CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
|