openSUSE Security Update : xen (openSUSE-SU-2013:1953-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Xen was updated to 4.2.3 c/s 26170 to fix various bugs and security
issues.

Following issues were fixed :

- bnc#845520 - CVE-2013-4416: xen: ocaml xenstored
mishandles oversized message replies

- bnc#833483 - Boot Failure with xen kernel in UEFI mode
with error 'No memory for trampoline'

- Improvements to block-dmmd script bnc#828623

- bnc#840196 - MTU size on Dom0 gets reset when booting
DomU with e1000 device

- bnc#840592 - CVE-2013-4355: XSA-63: xen: Information
leaks through I/O instruction emulation

- bnc#841766 - CVE-2013-4361: XSA-66: xen: Information
leak through fbld instruction emulation

- bnc#842511 - CVE-2013-4368: XSA-67: xen: Information
leak through outs instruction emulation

- bnc#842512 - CVE-2013-4369: XSA-68: xen: possible null
dereference when parsing vif ratelimiting info

- bnc#842513 - CVE-2013-4370: XSA-69: xen: misplaced free
in ocaml xc_vcpu_getaffinity stub

- bnc#842514 - CVE-2013-4371: XSA-70: xen: use-after-free
in libxl_list_cpupool under memory pressure

- bnc#842515 - CVE-2013-4375: XSA-71: xen: qemu disk
backend (qdisk) resource leak

- bnc#839596 - CVE-2013-1442: XSA-62: xen: Information
leak on AVX and/or LWP capable CPUs

- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI
x86_64 platform and with xen environment, in booting
stage ,xen hypervisor will panic.

- bnc#833796 - Xen: migration broken from xsave-capable to
xsave-incapable host

- bnc#834751 - [HP BCS SLES11 Bug]: In xen,
“shutdown –y 0 –h” cannot power
off system

- bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI
x86_64 platform and sles11sp3 with xen environment, xen
hypervisor will panic on multiple blades nPar.

- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI
x86_64 platform and with xen environment, in booting
stage ,xen hypervisor will panic.

- bnc#835896 - vcpus not started after upgrading Dom0 from
11SP2 to SP3

- bnc#836239 - SLES 11 SP3 Xen security patch does not
automatically update UEFI boot binary

See also :

http://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html
https://bugzilla.novell.com/show_bug.cgi?id=828623
https://bugzilla.novell.com/show_bug.cgi?id=833251
https://bugzilla.novell.com/show_bug.cgi?id=833483
https://bugzilla.novell.com/show_bug.cgi?id=833796
https://bugzilla.novell.com/show_bug.cgi?id=834751
https://bugzilla.novell.com/show_bug.cgi?id=835896
https://bugzilla.novell.com/show_bug.cgi?id=836239
https://bugzilla.novell.com/show_bug.cgi?id=839596
https://bugzilla.novell.com/show_bug.cgi?id=839600
https://bugzilla.novell.com/show_bug.cgi?id=840196
https://bugzilla.novell.com/show_bug.cgi?id=840592
https://bugzilla.novell.com/show_bug.cgi?id=841766
https://bugzilla.novell.com/show_bug.cgi?id=842511
https://bugzilla.novell.com/show_bug.cgi?id=842512
https://bugzilla.novell.com/show_bug.cgi?id=842513
https://bugzilla.novell.com/show_bug.cgi?id=842514
https://bugzilla.novell.com/show_bug.cgi?id=842515
https://bugzilla.novell.com/show_bug.cgi?id=845520

Solution :

Update the affected xen packages.

Risk factor :

Medium / CVSS Base Score : 5.2
(CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 74865 ()

Bugtraq ID:

CVE ID: CVE-2013-1442
CVE-2013-4355
CVE-2013-4361
CVE-2013-4368
CVE-2013-4369
CVE-2013-4370
CVE-2013-4371
CVE-2013-4375
CVE-2013-4416

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now