SuSE 11.1 Security Update : Xen (SAT Patch Number 4491)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Collective May/2011 update for Xen

Xen :

- 679344: Xen: multi-vCPU pv guest may crash host

- 675817: Kernel panic when creating HVM guests on AMD
platforms with XSAVE

- 678871: dom0 hangs long time when starting hvm guests
with memory >= 64GB

- 675363: Random lockups with kernel-xen. Possibly
graphics related

- 678229: restore of sles HVM fails

- 672833: xen-tools bug causing problems with Ubuntu 10.10
under Xen 4.

- 665610: xm console > 1 to same VM messes up both
consoles

- 687981: mistyping model type when defining VIF crashes
VM

- 688473: Fix potential buffer overflow in decode

- 691238: revert accidental behaviour change in xm list

- 680824: dom0 can't recognize boot disk when IOMMU is
enabled

- 623680: xen kernel freezes during boot when processor
module is loaded vm-install :

- 678152: virt-manager: harmless block device admin
actions on FV guests mess up network (VIF) device type
==> network lost.

- 688757: SLED10SP4 fully virtualized in SLES10SP4 XEN -
kernel panic libvirt :

- 674371: qemu aio mode per disk

- 675861: Force FLR on for buggy SR-IOV devices

- 678406: libvirt: several API calls do not honour
read-only

- 684877: libvirt: error reporting in libvirtd is not
thread safe

- 686737: virsh: Add option 'model' to attach-interface

- 681546: Fix xmdomain.cfg to libvirt XML format
conversion

- 688306: Handle support for recent KVM versions

See also :

https://bugzilla.novell.com/show_bug.cgi?id=623680
https://bugzilla.novell.com/show_bug.cgi?id=665610
https://bugzilla.novell.com/show_bug.cgi?id=672833
https://bugzilla.novell.com/show_bug.cgi?id=674371
https://bugzilla.novell.com/show_bug.cgi?id=675363
https://bugzilla.novell.com/show_bug.cgi?id=675817
https://bugzilla.novell.com/show_bug.cgi?id=675861
https://bugzilla.novell.com/show_bug.cgi?id=678152
https://bugzilla.novell.com/show_bug.cgi?id=678229
https://bugzilla.novell.com/show_bug.cgi?id=678406
https://bugzilla.novell.com/show_bug.cgi?id=678871
https://bugzilla.novell.com/show_bug.cgi?id=679344
https://bugzilla.novell.com/show_bug.cgi?id=680824
https://bugzilla.novell.com/show_bug.cgi?id=681546
https://bugzilla.novell.com/show_bug.cgi?id=684877
https://bugzilla.novell.com/show_bug.cgi?id=686737
https://bugzilla.novell.com/show_bug.cgi?id=687981
https://bugzilla.novell.com/show_bug.cgi?id=688306
https://bugzilla.novell.com/show_bug.cgi?id=688473
https://bugzilla.novell.com/show_bug.cgi?id=688757
https://bugzilla.novell.com/show_bug.cgi?id=691238
http://support.novell.com/security/cve/CVE-2011-1146.html
http://support.novell.com/security/cve/CVE-2011-1166.html
http://support.novell.com/security/cve/CVE-2011-1486.html
http://support.novell.com/security/cve/CVE-2011-1583.html

Solution :

Apply SAT patch number 4491.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 54934 ()

Bugtraq ID:

CVE ID: CVE-2011-1146
CVE-2011-1166
CVE-2011-1486
CVE-2011-1583

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now