SuSE 11.1 Security Update : Xen (SAT Patch Number 4491)

medium Nessus Plugin ID 54934

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Collective May/2011 update for Xen

Xen :

- 679344: Xen: multi-vCPU pv guest may crash host

- 675817: Kernel panic when creating HVM guests on AMD platforms with XSAVE

- 678871: dom0 hangs long time when starting hvm guests with memory >= 64GB

- 675363: Random lockups with kernel-xen. Possibly graphics related

- 678229: restore of sles HVM fails

- 672833: xen-tools bug causing problems with Ubuntu 10.10 under Xen 4.

- 665610: xm console > 1 to same VM messes up both consoles

- 687981: mistyping model type when defining VIF crashes VM

- 688473: Fix potential buffer overflow in decode

- 691238: revert accidental behaviour change in xm list

- 680824: dom0 can't recognize boot disk when IOMMU is enabled

- 623680: xen kernel freezes during boot when processor module is loaded vm-install :

- 678152: virt-manager: harmless block device admin actions on FV guests mess up network (VIF) device type ==> network lost.

- 688757: SLED10SP4 fully virtualized in SLES10SP4 XEN - kernel panic libvirt :

- 674371: qemu aio mode per disk

- 675861: Force FLR on for buggy SR-IOV devices

- 678406: libvirt: several API calls do not honour read-only

- 684877: libvirt: error reporting in libvirtd is not thread safe

- 686737: virsh: Add option 'model' to attach-interface

- 681546: Fix xmdomain.cfg to libvirt XML format conversion

- 688306: Handle support for recent KVM versions

Solution

Apply SAT patch number 4491.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=623680

https://bugzilla.novell.com/show_bug.cgi?id=665610

https://bugzilla.novell.com/show_bug.cgi?id=672833

https://bugzilla.novell.com/show_bug.cgi?id=674371

https://bugzilla.novell.com/show_bug.cgi?id=675363

https://bugzilla.novell.com/show_bug.cgi?id=675817

https://bugzilla.novell.com/show_bug.cgi?id=675861

https://bugzilla.novell.com/show_bug.cgi?id=678152

https://bugzilla.novell.com/show_bug.cgi?id=678229

https://bugzilla.novell.com/show_bug.cgi?id=678406

https://bugzilla.novell.com/show_bug.cgi?id=678871

https://bugzilla.novell.com/show_bug.cgi?id=679344

https://bugzilla.novell.com/show_bug.cgi?id=680824

https://bugzilla.novell.com/show_bug.cgi?id=681546

https://bugzilla.novell.com/show_bug.cgi?id=684877

https://bugzilla.novell.com/show_bug.cgi?id=686737

https://bugzilla.novell.com/show_bug.cgi?id=687981

https://bugzilla.novell.com/show_bug.cgi?id=688306

https://bugzilla.novell.com/show_bug.cgi?id=688473

https://bugzilla.novell.com/show_bug.cgi?id=688757

https://bugzilla.novell.com/show_bug.cgi?id=691238

http://support.novell.com/security/cve/CVE-2011-1146.html

http://support.novell.com/security/cve/CVE-2011-1166.html

http://support.novell.com/security/cve/CVE-2011-1486.html

http://support.novell.com/security/cve/CVE-2011-1583.html

Plugin Details

Severity: Medium

ID: 54934

File Name: suse_11_xen-201105-110505.nasl

Version: 1.8

Type: local

Agent: unix

Published: 6/1/2011

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:libvirt, p-cpe:/a:novell:suse_linux:11:libvirt-doc, p-cpe:/a:novell:suse_linux:11:libvirt-python, p-cpe:/a:novell:suse_linux:11:vm-install, p-cpe:/a:novell:suse_linux:11:xen, p-cpe:/a:novell:suse_linux:11:xen-doc-html, p-cpe:/a:novell:suse_linux:11:xen-doc-pdf, p-cpe:/a:novell:suse_linux:11:xen-kmp-default, p-cpe:/a:novell:suse_linux:11:xen-kmp-pae, p-cpe:/a:novell:suse_linux:11:xen-libs, p-cpe:/a:novell:suse_linux:11:xen-tools, p-cpe:/a:novell:suse_linux:11:xen-tools-domu, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/5/2011

Reference Information

CVE: CVE-2011-1146, CVE-2011-1166, CVE-2011-1486, CVE-2011-1583