SUSE SLED11 / SLES11 Security Update : Xen (SUSE-SU-2013:1774-1)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs
and security issues.

- CVE-2013-4416: XSA-72: Fixed ocaml xenstored that
mishandled oversized message replies

- CVE-2013-4355: XSA-63: Fixed information leaks through
I/O instruction emulation

- CVE-2013-4361: XSA-66: Fixed information leak through
fbld instruction emulation

- CVE-2013-4368: XSA-67: Fixed information leak through
outs instruction emulation

- CVE-2013-4369: XSA-68: Fixed possible null dereference
when parsing vif ratelimiting info

- CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
xc_vcpu_getaffinity stub

- CVE-2013-4371: XSA-70: Fixed use-after-free in
libxl_list_cpupool under memory pressure

- CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk)
resource leak

- CVE-2013-1442: XSA-62: Fixed information leak on AVX
and/or LWP capable CPUs

- CVE-2013-1432: XSA-58: Page reference counting error due
to XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed :

- Boot failure with xen kernel in UEFI mode with error 'No
memory for trampoline' (bnc#833483)

- Improvements to block-dmmd script (bnc#828623)

- MTU size on Dom0 gets reset when booting DomU with e1000
device (bnc#840196)

- In HP's UEFI x86_64 platform and with xen environment,
in booting stage, xen hypervisor will panic.
(bnc#833251)

- Xen: migration broken from xsave-capable to
xsave-incapable host (bnc#833796)

- In xen, 'shutdown -y 0 -h' cannot power off system
(bnc#834751)

- In HP's UEFI x86_64 platform with xen environment, xen
hypervisor will panic on multiple blades nPar.
(bnc#839600)

- vcpus not started after upgrading Dom0 from SLES 11 SP2
to SP3 (bnc#835896)

- SLES 11 SP3 Xen security patch does not automatically
update UEFI boot binary (bnc#836239)

- Failed to setup devices for vm instance when start
multiple vms simultaneously (bnc#824676)

- SLES 9 SP4 guest fails to start after upgrading to SLES
11 SP3 (bnc#817799)

- Various upstream fixes have been included.

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?6759046d
http://support.novell.com/security/cve/CVE-2013-1432.html
http://support.novell.com/security/cve/CVE-2013-1442.html
http://support.novell.com/security/cve/CVE-2013-1918.html
http://support.novell.com/security/cve/CVE-2013-4355.html
http://support.novell.com/security/cve/CVE-2013-4361.html
http://support.novell.com/security/cve/CVE-2013-4368.html
http://support.novell.com/security/cve/CVE-2013-4369.html
http://support.novell.com/security/cve/CVE-2013-4370.html
http://support.novell.com/security/cve/CVE-2013-4371.html
http://support.novell.com/security/cve/CVE-2013-4375.html
http://support.novell.com/security/cve/CVE-2013-4416.html
https://bugzilla.novell.com/817799
https://bugzilla.novell.com/824676
https://bugzilla.novell.com/826882
https://bugzilla.novell.com/828623
https://bugzilla.novell.com/833251
https://bugzilla.novell.com/833483
https://bugzilla.novell.com/833796
https://bugzilla.novell.com/834751
https://bugzilla.novell.com/835896
https://bugzilla.novell.com/836239
https://bugzilla.novell.com/839596
https://bugzilla.novell.com/839600
https://bugzilla.novell.com/840196
https://bugzilla.novell.com/840592
https://bugzilla.novell.com/841766
https://bugzilla.novell.com/842511
https://bugzilla.novell.com/842512
https://bugzilla.novell.com/842513
https://bugzilla.novell.com/842514
https://bugzilla.novell.com/842515
https://bugzilla.novell.com/845520
http://www.nessus.org/u?f72f7687

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Software Development Kit 11 SP3 :

zypper in -t patch sdksp3-xen-201310-8479

SUSE Linux Enterprise Server 11 SP3 :

zypper in -t patch slessp3-xen-201310-8479

SUSE Linux Enterprise Desktop 11 SP3 :

zypper in -t patch sledsp3-xen-201310-8479

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.4
(CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now