OracleVM 3.4 : xen (OVMSA-2017-0094)

high Nessus Plugin ID 99975

Synopsis

The remote OracleVM host is missing one or more security updates.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- BUILDINFO: xen commit=8ee9cbea8e71c968e602d5b4974601d283d61d28

- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86: correct create_bounce_frame (Boris Ostrovsky) [Orabug: 25927745]

- x86: discard type information when stealing pages (Boris Ostrovsky)

- multicall: deal with early exit conditions (Boris Ostrovsky) [Orabug: 25927612]

- BUILDINFO: xen commit=66e33522666436a4b6c13fbaa77b4942876bb5f7

- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- kexec: Add spinlock for the whole hypercall. (Konrad Rzeszutek Wilk)

- kexec: clear kexec_image slot when unloading kexec image (Bhavesh Davda) [Orabug: 25861731]

- BUILDINFO: xen commit=337c8edcc582f8bfb1bcfcb5a475c5fc18ff2def

- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- memory: properly check guest memory ranges in XENMEM_exchange handling (Jan Beulich) [Orabug:
25760559] (CVE-2017-7228)

- xenstored: Log when the write transaction rate limit bites (Ian Jackson) [Orabug: 25745225]

- xenstored: apply a write transaction rate limit (Ian Jackson)

- BUILDINFO: xen commit=17b0cd2109c42553e9c8c34d3a2b8252abead104

- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335

- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xm: Fix the error message displayed by 'xm create ...' (Venu Busireddy) [Orabug: 25721696]

- xm: expand pci hidden devices tools (Venu Busireddy) [Orabug: 25721624]

- BUILDINFO: xen commit=81f33e7316b476c319f42eb56ac58fc450804ded

- BUILDINFO: QEMU upstream commit=2e4e0a805aeb448242b43399e0853b851bccde4e

- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend: fix vif device ID allocation (Zhigang Wang) [Orabug: 25692157]

- BUILDINFO: xen commit=68930e8bbd9311ebd12fdb251362a2e1f9987fba

- BUILDINFO: QEMU upstream commit=f663d3dd4e968756d33e29cb2c2c956cabbdd4ca

- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend: fix waitForSuspend (Zhigang Wang) [Orabug:
25638583] [Orabug: 25653480]

- IOMMU: always call teardown callback (Oleksandr Tyshchenko) [Orabug: 25485193]

- BUILDINFO: xen commit=9f3030e391274b89deb80c86a6343dac473916b3

- BUILDINFO: QEMU upstream commit=f663d3dd4e968756d33e29cb2c2c956cabbdd4ca

- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c

- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- one-off build

Solution

Update the affected xen / xen-tools packages.

See Also

https://oss.oracle.com/pipermail/oraclevm-errata/2017-May/000689.html

Plugin Details

Severity: High

ID: 99975

File Name: oraclevm_OVMSA-2017-0094.nasl

Version: 3.7

Type: local

Published: 5/4/2017

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/3/2017

Vulnerability Publication Date: 4/4/2017

Reference Information

CVE: CVE-2017-7228