SuSE 11.3 Security Update : KVM (SAT Patch Number 9302)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing a security update.

Description :

Several security issues in KVM have been fixed. Some issues could have
resulted in arbitrary code execution or crash of the kvm host.

- virtio-net: buffer overflow in virtio_net_handle_mac()
function. (CVE-2014-0150)

- Fixed out of bounds buffer accesses, guest triggerable
via IDE SMART. (CVE-2014-2894)

- Fixed various virtio-net buffer overflows.
(CVE-2013-4148 / CVE-2013-4149 / CVE-2013-4150 /
CVE-2013-4151)

- Fixed ahci buffer overrun. (CVE-2013-4526)

- Fixed hpet buffer overrun. (CVE-2013-4527)

- Fixed a PCIE-AER buffer overrun. (CVE-2013-4529)

- Fixed a buffer overrun in pl022. (CVE-2013-4530)

- Fixed a vmstate buffer overflow. (CVE-2013-4531)

- Fixed a pxa2xx buffer overrun. (CVE-2013-4533)

- Fixed a openpic buffer overrun. (CVE-2013-4534)

- Validate virtio num_sg mapping. (CVE-2013-4535 /
CVE-2013-4536)

- Fixed ssi-sd buffer overrun. (CVE-2013-4537)

- Fixed ssd0323 buffer overrun. (CVE-2013-4538)

- Fixed tsc210x buffer overrun. (CVE-2013-4539)

- Fixed Zaurus buffer overrun. (CVE-2013-4540)

- Some USB sanity checking added. (CVE-2013-4541)

- Fixed virtio scsi buffer overrun. (CVE-2013-4542)

- Fixed another virtio buffer overrun. (CVE-2013-6399)

- Validate config_len on load in virtio (CVE-2014-0182)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=864391
https://bugzilla.novell.com/show_bug.cgi?id=864649
https://bugzilla.novell.com/show_bug.cgi?id=864650
https://bugzilla.novell.com/show_bug.cgi?id=864653
https://bugzilla.novell.com/show_bug.cgi?id=864655
https://bugzilla.novell.com/show_bug.cgi?id=864665
https://bugzilla.novell.com/show_bug.cgi?id=864671
https://bugzilla.novell.com/show_bug.cgi?id=864673
https://bugzilla.novell.com/show_bug.cgi?id=864678
https://bugzilla.novell.com/show_bug.cgi?id=864682
https://bugzilla.novell.com/show_bug.cgi?id=864769
https://bugzilla.novell.com/show_bug.cgi?id=864796
https://bugzilla.novell.com/show_bug.cgi?id=864801
https://bugzilla.novell.com/show_bug.cgi?id=864802
https://bugzilla.novell.com/show_bug.cgi?id=864804
https://bugzilla.novell.com/show_bug.cgi?id=864805
https://bugzilla.novell.com/show_bug.cgi?id=864811
https://bugzilla.novell.com/show_bug.cgi?id=864812
https://bugzilla.novell.com/show_bug.cgi?id=864814
https://bugzilla.novell.com/show_bug.cgi?id=873235
https://bugzilla.novell.com/show_bug.cgi?id=874749
https://bugzilla.novell.com/show_bug.cgi?id=874788
http://support.novell.com/security/cve/CVE-2013-4148.html
http://support.novell.com/security/cve/CVE-2013-4149.html
http://support.novell.com/security/cve/CVE-2013-4150.html
http://support.novell.com/security/cve/CVE-2013-4151.html
http://support.novell.com/security/cve/CVE-2013-4526.html
http://support.novell.com/security/cve/CVE-2013-4527.html
http://support.novell.com/security/cve/CVE-2013-4529.html
http://support.novell.com/security/cve/CVE-2013-4530.html
http://support.novell.com/security/cve/CVE-2013-4531.html
http://support.novell.com/security/cve/CVE-2013-4533.html
http://support.novell.com/security/cve/CVE-2013-4534.html
http://support.novell.com/security/cve/CVE-2013-4535.html
http://support.novell.com/security/cve/CVE-2013-4536.html
http://support.novell.com/security/cve/CVE-2013-4537.html
http://support.novell.com/security/cve/CVE-2013-4538.html
http://support.novell.com/security/cve/CVE-2013-4539.html
http://support.novell.com/security/cve/CVE-2013-4540.html
http://support.novell.com/security/cve/CVE-2013-4541.html
http://support.novell.com/security/cve/CVE-2013-4542.html
http://support.novell.com/security/cve/CVE-2013-6399.html
http://support.novell.com/security/cve/CVE-2014-0150.html
http://support.novell.com/security/cve/CVE-2014-0182.html
http://support.novell.com/security/cve/CVE-2014-2894.html

Solution :

Apply SAT patch number 9302.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)