Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2016.2725.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2016:2725-1)
Summary:The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2016:2725-1 advisory.
Description:Summary:
The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2016:2725-1 advisory.

Vulnerability Insight:
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS
administrators on guests running with shadow paging to cause a denial of
service via a pagetable update (bsc#995792)
- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen
allowed local 32-bit PV guest OS administrators to gain host OS
privileges via vectors related to L3 recursive pagetables (bsc#995785)
- CVE-2016-5403: Unbounded memory allocation allowed a guest administrator
to cause a denial of service of the host (bsc#990923)
- CVE-2016-6351: The esp_do_dma function in hw/scsi/esp.c, when built with
ESP/NCR53C9x controller emulation support, allowed local guest OS
administrators to cause a denial of service (out-of-bounds write and
QEMU process crash) or execute arbitrary code on the host via vectors
involving DMA read into ESP command buffer (bsc#990843)
- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed
local 32-bit PV guest OS administrators to gain host OS privileges by
leveraging fast-paths for updating pagetable entries (bsc#988675)
- CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions
allowed local guest OS administrators to cause a denial of service (QEMU
process crash) or execute arbitrary code on the host via vectors related
to the information transfer buffer (bsc#983984)
- CVE-2016-5238: The get_cmd function in hw/scsi/esp.c might have allowed
local guest OS administrators to cause a denial of service
(out-of-bounds write and QEMU process crash) via vectors related to
reading from the information transfer buffer in non-DMA mode (bsc#982960)
- CVE-2016-4453: The vmsvga_fifo_run function allowed local guest OS
administrators to cause a denial of service (infinite loop and QEMU
process crash) via a VGA command (bsc#982225)
- CVE-2016-4454: The vmsvga_fifo_read_raw function allowed local guest OS
administrators to obtain sensitive host memory information or cause a
denial of service (QEMU process crash) by changing FIFO registers and
issuing a VGA command, which triggered an out-of-bounds read (bsc#982224)
- CVE-2014-3672: The qemu implementation in libvirt Xen allowed local
guest OS users to cause a denial of service (host disk consumption) by
writing to stdout or stderr (bsc#981264)
- CVE-2016-4441: The get_cmd function in the 53C9X Fast SCSI Controller
(FSC) support did not properly check DMA length, which allowed local
guest OS administrators to cause a denial of service (out-of-bounds
write and QEMU process crash) via unspecified vectors, involving an SCSI
command (bsc#980724)
- CVE-2016-4439: The esp_reg_write function in the 53C9X Fast SCSI
Controller (FSC) support did not properly check command buffer length,
which allowed local guest OS administrators to cause a denial of service
(out-of-bounds write and QEMU process crash) ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'xen' package(s) on SUSE OpenStack Cloud 5, SUSE Manager Proxy 2.1, SUSE Manager 2.1, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Point of Sale 11-SP3

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3615
BugTraq ID: 69654
http://www.securityfocus.com/bid/69654
Debian Security Information: DSA-3044 (Google Search)
http://www.debian.org/security/2014/dsa-3044
RedHat Security Advisories: RHSA-2014:1669
http://rhn.redhat.com/errata/RHSA-2014-1669.html
RedHat Security Advisories: RHSA-2014:1670
http://rhn.redhat.com/errata/RHSA-2014-1670.html
RedHat Security Advisories: RHSA-2014:1941
http://rhn.redhat.com/errata/RHSA-2014-1941.html
http://secunia.com/advisories/61829
SuSE Security Announcement: openSUSE-SU-2015:0732 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
http://www.ubuntu.com/usn/USN-2409-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-3672
http://www.openwall.com/lists/oss-security/2016/05/24/5
http://www.securitytracker.com/id/1035945
Common Vulnerability Exposure (CVE) ID: CVE-2016-3158
BugTraq ID: 85714
http://www.securityfocus.com/bid/85714
Debian Security Information: DSA-3554 (Google Search)
http://www.debian.org/security/2016/dsa-3554
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html
http://www.securitytracker.com/id/1035435
Common Vulnerability Exposure (CVE) ID: CVE-2016-3159
BugTraq ID: 85716
http://www.securityfocus.com/bid/85716
Common Vulnerability Exposure (CVE) ID: CVE-2016-3710
BugTraq ID: 90316
http://www.securityfocus.com/bid/90316
Debian Security Information: DSA-3573 (Google Search)
http://www.debian.org/security/2016/dsa-3573
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html
http://www.openwall.com/lists/oss-security/2016/05/09/3
RedHat Security Advisories: RHSA-2016:0724
http://rhn.redhat.com/errata/RHSA-2016-0724.html
RedHat Security Advisories: RHSA-2016:0725
http://rhn.redhat.com/errata/RHSA-2016-0725.html
RedHat Security Advisories: RHSA-2016:0997
http://rhn.redhat.com/errata/RHSA-2016-0997.html
RedHat Security Advisories: RHSA-2016:0999
http://rhn.redhat.com/errata/RHSA-2016-0999.html
RedHat Security Advisories: RHSA-2016:1000
http://rhn.redhat.com/errata/RHSA-2016-1000.html
RedHat Security Advisories: RHSA-2016:1001
http://rhn.redhat.com/errata/RHSA-2016-1001.html
RedHat Security Advisories: RHSA-2016:1002
http://rhn.redhat.com/errata/RHSA-2016-1002.html
RedHat Security Advisories: RHSA-2016:1019
http://rhn.redhat.com/errata/RHSA-2016-1019.html
RedHat Security Advisories: RHSA-2016:1224
https://access.redhat.com/errata/RHSA-2016:1224
RedHat Security Advisories: RHSA-2016:1943
http://rhn.redhat.com/errata/RHSA-2016-1943.html
http://www.securitytracker.com/id/1035794
http://www.ubuntu.com/usn/USN-2974-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-3712
BugTraq ID: 90314
http://www.securityfocus.com/bid/90314
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html
http://www.openwall.com/lists/oss-security/2016/05/09/4
RedHat Security Advisories: RHSA-2016:2585
http://rhn.redhat.com/errata/RHSA-2016-2585.html
RedHat Security Advisories: RHSA-2017:0621
http://rhn.redhat.com/errata/RHSA-2017-0621.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-3960
BugTraq ID: 86318
http://www.securityfocus.com/bid/86318
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
http://www.securitytracker.com/id/1035587
Common Vulnerability Exposure (CVE) ID: CVE-2016-4001
BugTraq ID: 85976
http://www.securityfocus.com/bid/85976
https://security.gentoo.org/glsa/201609-01
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
http://www.openwall.com/lists/oss-security/2016/04/11/4
http://www.openwall.com/lists/oss-security/2016/04/12/6
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4002
BugTraq ID: 85992
http://www.securityfocus.com/bid/85992
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html
http://www.openwall.com/lists/oss-security/2016/04/11/6
http://www.openwall.com/lists/oss-security/2016/04/12/7
Common Vulnerability Exposure (CVE) ID: CVE-2016-4439
BugTraq ID: 90760
http://www.securityfocus.com/bid/90760
http://www.openwall.com/lists/oss-security/2016/05/19/3
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html
http://www.ubuntu.com/usn/USN-3047-1
http://www.ubuntu.com/usn/USN-3047-2
Common Vulnerability Exposure (CVE) ID: CVE-2016-4441
BugTraq ID: 90762
http://www.securityfocus.com/bid/90762
http://www.openwall.com/lists/oss-security/2016/05/19/4
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4453
BugTraq ID: 90928
http://www.securityfocus.com/bid/90928
http://www.openwall.com/lists/oss-security/2016/05/30/2
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05270.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4454
BugTraq ID: 90927
http://www.securityfocus.com/bid/90927
http://www.openwall.com/lists/oss-security/2016/05/30/3
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05271.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-4480
BugTraq ID: 90710
http://www.securityfocus.com/bid/90710
Debian Security Information: DSA-3633 (Google Search)
http://www.debian.org/security/2016/dsa-3633
http://www.securitytracker.com/id/1035901
Common Vulnerability Exposure (CVE) ID: CVE-2016-5238
BugTraq ID: 90995
http://www.securityfocus.com/bid/90995
http://www.openwall.com/lists/oss-security/2016/06/02/2
http://www.openwall.com/lists/oss-security/2016/06/02/9
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html
https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5338
BugTraq ID: 91079
http://www.securityfocus.com/bid/91079
http://www.openwall.com/lists/oss-security/2016/06/07/3
http://www.openwall.com/lists/oss-security/2016/06/08/14
https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5403
BugTraq ID: 92148
http://www.securityfocus.com/bid/92148
https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
RedHat Security Advisories: RHSA-2016:1585
http://rhn.redhat.com/errata/RHSA-2016-1585.html
RedHat Security Advisories: RHSA-2016:1586
http://rhn.redhat.com/errata/RHSA-2016-1586.html
RedHat Security Advisories: RHSA-2016:1606
http://rhn.redhat.com/errata/RHSA-2016-1606.html
RedHat Security Advisories: RHSA-2016:1607
http://rhn.redhat.com/errata/RHSA-2016-1607.html
RedHat Security Advisories: RHSA-2016:1652
http://rhn.redhat.com/errata/RHSA-2016-1652.html
RedHat Security Advisories: RHSA-2016:1653
http://rhn.redhat.com/errata/RHSA-2016-1653.html
RedHat Security Advisories: RHSA-2016:1654
http://rhn.redhat.com/errata/RHSA-2016-1654.html
RedHat Security Advisories: RHSA-2016:1655
http://rhn.redhat.com/errata/RHSA-2016-1655.html
RedHat Security Advisories: RHSA-2016:1756
http://rhn.redhat.com/errata/RHSA-2016-1756.html
RedHat Security Advisories: RHSA-2016:1763
http://rhn.redhat.com/errata/RHSA-2016-1763.html
http://www.securitytracker.com/id/1036476
Common Vulnerability Exposure (CVE) ID: CVE-2016-6258
BugTraq ID: 92131
http://www.securityfocus.com/bid/92131
https://security.gentoo.org/glsa/201611-09
http://www.securitytracker.com/id/1036446
Common Vulnerability Exposure (CVE) ID: CVE-2016-6351
BugTraq ID: 92119
http://www.securityfocus.com/bid/92119
http://www.openwall.com/lists/oss-security/2016/07/25/14
http://www.openwall.com/lists/oss-security/2016/07/26/7
Common Vulnerability Exposure (CVE) ID: CVE-2016-7092
BugTraq ID: 92862
http://www.securityfocus.com/bid/92862
Debian Security Information: DSA-3663 (Google Search)
http://www.debian.org/security/2016/dsa-3663
http://www.securitytracker.com/id/1036751
Common Vulnerability Exposure (CVE) ID: CVE-2016-7094
BugTraq ID: 92864
http://www.securityfocus.com/bid/92864
http://www.securitytracker.com/id/1036753
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.