Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2014:1710-1)
Summary:The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1710-1 advisory.
The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2014:1710-1 advisory.

Vulnerability Insight:
xen was updated to fix 14 security issues:

* Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
* Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
hypervisor (CVE-2014-8867).
* Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW
emulation (CVE-2014-7155).
* Hypervisor heap contents leaked to guests (CVE-2014-4021).
* Missing privilege level checks in x86 emulation of far branches
* Insufficient restrictions on certain MMU update hypercalls
* Intel VT-d Interrupt Remapping engines can be evaded by native NMI
interrupts (CVE-2013-3495).
* Missing privilege level checks in x86 emulation of software
interrupts (CVE-2014-7156).
* Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
* Improper MSR range used for x2APIC emulation (CVE-2014-7188).
* HVMOP_set_mem_type allows invalid P2M entries to be created
* HVMOP_set_mem_access is not preemptible (CVE-2014-2599).
* Excessive checking in compatibility mode hypercall argument
translation (CVE-2014-8866).
* Guest user mode triggerable VM exits not handled by hypervisor

This non-security bug was fixed:

* Increase limit domUloader to 32MB (bnc#901317).

Security Issues:

* CVE-2014-9030
* CVE-2014-8867
* CVE-2014-7155
* CVE-2014-4021
* CVE-2014-8595
* CVE-2014-8594
* CVE-2013-3495
* CVE-2014-7156
* CVE-2014-7154
* CVE-2014-7188
* CVE-2014-3124
* CVE-2014-2599
* CVE-2014-8866Special Instructions and Notes:
Please reboot the system after installing this update.

Affected Software/OS:
'xen' package(s) on SUSE Linux Enterprise Server 11 SP2

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-3495
BugTraq ID: 61854
SuSE Security Announcement: openSUSE-SU-2015:0226 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:0256 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-2599
BugTraq ID: 66407
Debian Security Information: DSA-3006 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:1279 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-3124
BugTraq ID: 67113
SuSE Security Announcement: openSUSE-SU-2014:1281 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-4021
BugTraq ID: 68070
Common Vulnerability Exposure (CVE) ID: CVE-2014-7154
Debian Security Information: DSA-3041 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-7155
BugTraq ID: 70057
Common Vulnerability Exposure (CVE) ID: CVE-2014-7156
BugTraq ID: 70062
Common Vulnerability Exposure (CVE) ID: CVE-2014-7188
BugTraq ID: 70198
XForce ISS Database: xen-cve20147188-dos(96785)
Common Vulnerability Exposure (CVE) ID: CVE-2014-8594
BugTraq ID: 71149
Debian Security Information: DSA-3140 (Google Search)
XForce ISS Database: xen-cve20148594-sec-byass(98767)
Common Vulnerability Exposure (CVE) ID: CVE-2014-8595
BugTraq ID: 71151
XForce ISS Database: xen-cve20148595-priv-esc(98768)
Common Vulnerability Exposure (CVE) ID: CVE-2014-8866
BugTraq ID: 71332
Common Vulnerability Exposure (CVE) ID: CVE-2014-8867
BugTraq ID: 71331
RedHat Security Advisories: RHSA-2015:0783
Common Vulnerability Exposure (CVE) ID: CVE-2014-9030
BugTraq ID: 71207
XForce ISS Database: xen-mmumachphysupdate-dos(98853)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.