Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.851134
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for xen (openSUSE-SU-2015:2003-1)
Zusammenfassung:The remote host is missing an update for the 'xen'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'xen'
package(s) announced via the referenced advisory.

Vulnerability Insight:
xen was updated to fix 12 security issues.

These security issues were fixed:

- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash
guests (bsc#951845).

- CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS)
(bsc#950703).

- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array
(DoS) (bsc#950705).

- CVE-2015-7971: Some pmu and profiling hypercalls log without rate
limiting (bsc#950706).

- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).

- CVE-2014-0222: Validate L2 table size to avoid integer overflows
(bsc#877642).

- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests
(bsc#950367).

- CVE-2015-7311: libxl fails to honour readonly flag on disks with
qemu-xen (bsc#947165).

- CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device
model (bsc#939712).

- CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol
(bsc#939709).

- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

- CVE-2015-3259: xl command line config handling stack overflow
(bsc#935634).

These non-security issues were fixed:

- bsc#907514: Bus fatal error and sles12 sudden reboot has been observed

- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of
guest with VT-d NIC

- bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been
observed

- bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has
been observed

- bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting
in irq problems on servers with a large amount of CPU cores

- bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show
errors

- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort

- bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in
vnc_client_read() and protocol_client_msg()

- bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue

- bsc#925466: Kdump does not work in a XEN environment

Affected Software/OS:
xen on openSUSE 13.2

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-0222
BugTraq ID: 67357
http://www.securityfocus.com/bid/67357
Debian Security Information: DSA-3044 (Google Search)
http://www.debian.org/security/2014/dsa-3044
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html
https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html
http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
SuSE Security Announcement: SUSE-SU-2015:0929 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
SuSE Security Announcement: openSUSE-SU-2015:1965 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3259
BugTraq ID: 75573
http://www.securityfocus.com/bid/75573
Debian Security Information: DSA-3414 (Google Search)
http://www.debian.org/security/2015/dsa-3414
https://security.gentoo.org/glsa/201604-03
http://www.securitytracker.com/id/1032973
SuSE Security Announcement: SUSE-SU-2015:1299 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html
SuSE Security Announcement: SUSE-SU-2015:1302 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-4037
BugTraq ID: 74809
http://www.securityfocus.com/bid/74809
Debian Security Information: DSA-3284 (Google Search)
http://www.debian.org/security/2015/dsa-3284
Debian Security Information: DSA-3285 (Google Search)
http://www.debian.org/security/2015/dsa-3285
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160414.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160058.html
http://www.openwall.com/lists/oss-security/2015/05/13/7
http://www.openwall.com/lists/oss-security/2015/05/16/5
http://www.openwall.com/lists/oss-security/2015/05/23/4
http://www.securitytracker.com/id/1032547
SuSE Security Announcement: SUSE-SU-2015:1152 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
SuSE Security Announcement: SUSE-SU-2015:1519 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
http://www.ubuntu.com/usn/USN-2630-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-5154
BugTraq ID: 76048
http://www.securityfocus.com/bid/76048
Debian Security Information: DSA-3348 (Google Search)
http://www.debian.org/security/2015/dsa-3348
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163658.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163472.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163681.html
https://security.gentoo.org/glsa/201510-02
RedHat Security Advisories: RHSA-2015:1507
http://rhn.redhat.com/errata/RHSA-2015-1507.html
RedHat Security Advisories: RHSA-2015:1508
http://rhn.redhat.com/errata/RHSA-2015-1508.html
RedHat Security Advisories: RHSA-2015:1512
http://rhn.redhat.com/errata/RHSA-2015-1512.html
http://www.securitytracker.com/id/1033074
SuSE Security Announcement: SUSE-SU-2015:1409 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html
SuSE Security Announcement: SUSE-SU-2015:1421 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
SuSE Security Announcement: SUSE-SU-2015:1426 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
SuSE Security Announcement: SUSE-SU-2015:1455 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html
SuSE Security Announcement: SUSE-SU-2015:1643 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
SuSE Security Announcement: SUSE-SU-2015:1782 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-5165
BugTraq ID: 76153
http://www.securityfocus.com/bid/76153
Debian Security Information: DSA-3349 (Google Search)
http://www.debian.org/security/2015/dsa-3349
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
RedHat Security Advisories: RHSA-2015:1674
http://rhn.redhat.com/errata/RHSA-2015-1674.html
RedHat Security Advisories: RHSA-2015:1683
http://rhn.redhat.com/errata/RHSA-2015-1683.html
RedHat Security Advisories: RHSA-2015:1739
http://rhn.redhat.com/errata/RHSA-2015-1739.html
RedHat Security Advisories: RHSA-2015:1740
http://rhn.redhat.com/errata/RHSA-2015-1740.html
RedHat Security Advisories: RHSA-2015:1793
http://rhn.redhat.com/errata/RHSA-2015-1793.html
RedHat Security Advisories: RHSA-2015:1833
http://rhn.redhat.com/errata/RHSA-2015-1833.html
http://www.securitytracker.com/id/1033176
Common Vulnerability Exposure (CVE) ID: CVE-2015-5166
BugTraq ID: 76152
http://www.securityfocus.com/bid/76152
http://www.securitytracker.com/id/1033175
Common Vulnerability Exposure (CVE) ID: CVE-2015-5239
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
http://www.openwall.com/lists/oss-security/2015/09/02/7
http://www.ubuntu.com/usn/USN-2745-1
Common Vulnerability Exposure (CVE) ID: CVE-2015-6815
http://www.openwall.com/lists/oss-security/2015/09/04/4
http://www.openwall.com/lists/oss-security/2015/09/05/5
https://bugzilla.redhat.com/show_bug.cgi?id=1260076
Common Vulnerability Exposure (CVE) ID: CVE-2015-7311
BugTraq ID: 76823
http://www.securityfocus.com/bid/76823
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167077.html
http://www.securitytracker.com/id/1033633
SuSE Security Announcement: openSUSE-SU-2015:2250 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-7835
BugTraq ID: 77366
http://www.securityfocus.com/bid/77366
Debian Security Information: DSA-3390 (Google Search)
http://www.debian.org/security/2015/dsa-3390
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
http://www.securitytracker.com/id/1034032
Common Vulnerability Exposure (CVE) ID: CVE-2015-7969
BugTraq ID: 77364
http://www.securityfocus.com/bid/77364
http://www.securitytracker.com/id/1034033
Common Vulnerability Exposure (CVE) ID: CVE-2015-7971
BugTraq ID: 77363
http://www.securityfocus.com/bid/77363
http://www.securitytracker.com/id/1034035
Common Vulnerability Exposure (CVE) ID: CVE-2015-7972
BugTraq ID: 77365
http://www.securityfocus.com/bid/77365
http://www.securitytracker.com/id/1034036
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.