SUSE SLES11 Security Update : xen (SUSE-SU-2016:1154-1)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

xen was updated to fix 27 security issues.

These security issues were fixed :

- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load
function in hw/arm/pxa2xx.c allowed remote attackers to
cause a denial of service or possibly execute arbitrary
code via a crafted s->rx_level value in a savevm image
(bsc#864655).

- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c
allowed remote attackers to cause a denial of service or
possibly execute arbitrary code via vectors related to
IRQDest elements (bsc#864811).

- CVE-2013-4537: The ssi_sd_transfer function in
hw/sd/ssi-sd.c allowed remote attackers to execute
arbitrary code via a crafted arglen value in a savevm
image (bsc#864391).

- CVE-2013-4538: Multiple buffer overflows in the
ssd0323_load function in hw/display/ssd0323.c allowed
remote attackers to cause a denial of service (memory
corruption) or possibly execute arbitrary code via
crafted (1) cmd_len, (2) row, or (3) col values; (4)
row_start and row_end values; or (5) col_star and
col_end values in a savevm image (bsc#864769).

- CVE-2013-4539: Multiple buffer overflows in the
tsc210x_load function in hw/input/tsc210x.c might have
allowed remote attackers to execute arbitrary code via a
crafted (1) precision, (2) nextprecision, (3) function,
or (4) nextfunction value in a savevm image
(bsc#864805).

- CVE-2014-0222: Integer overflow in the qcow_open
function in block/qcow.c allowed remote attackers to
cause a denial of service (crash) via a large L2 table
in a QCOW version 1 image (bsc#877642).

- CVE-2014-3640: The sosendto function in slirp/udp.c
allowed local users to cause a denial of service (NULL
pointer dereference) by sending a udp packet with a
value of 0 in the source port and address, which
triggers access of an uninitialized socket (bsc#897654).

- CVE-2014-3689: The vmware-vga driver
(hw/display/vmware_vga.c) allowed local guest users to
write to qemu memory locations and gain privileges via
unspecified parameters related to rectangle handling
(bsc#901508).

- CVE-2014-7815: The set_pixel_format function in ui/vnc.c
allowed remote attackers to cause a denial of service
(crash) via a small bytes_per_pixel value (bsc#902737).

- CVE-2015-5278: Infinite loop in ne2000_receive()
function (bsc#945989).

- CVE-2015-7512: Buffer overflow in the pcnet_receive
function in hw/net/pcnet.c, when a guest NIC has a
larger MTU, allowed remote attackers to cause a denial
of service (guest OS crash) or execute arbitrary code
via a large packet (bsc#957162).

- CVE-2015-8504: VNC: floating point exception
(bsc#958491).

- CVE-2015-8550: Paravirtualized drivers were incautious
about shared memory contents (XSA-155) (bsc#957988).

- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling
(XSA-164) (bsc#958007).

- CVE-2015-8555: Information leak in legacy x86 FPU/XMM
initialization (XSA-165) (bsc#958009).

- CVE-2015-8558: Infinite loop in ehci_advance_state
resulted in DoS (bsc#959005).

- CVE-2015-8743: ne2000: OOB memory access in ioport r/w
functions (bsc#960725).

- CVE-2015-8745: Reading IMR registers lead to a crash via
assert(2) call (bsc#960707).

- CVE-2016-1570: The PV superpage functionality in
arch/x86/mm.c allowed local PV guests to obtain
sensitive information, cause a denial of service, gain
privileges, or have unspecified other impact via a
crafted page identifier (MFN) to the (1)
MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in
the HYPERVISOR_mmuext_op hypercall or (3) unknown
vectors related to page table updates (bsc#960861).

- CVE-2016-1571: VMX: intercept issue with INVLPG on
non-canonical address (XSA-168) (bsc#960862).

- CVE-2016-1714: nvram: OOB r/w access in processing
firmware configurations (bsc#961691).

- CVE-2016-1981: e1000 infinite loop in start_xmit and
e1000_receive_iov routines (bsc#963782).

- CVE-2016-2270: Xen allowed local guest administrators to
cause a denial of service (host reboot) via vectors
related to multiple mappings of MMIO pages with
different cachability settings (bsc#965315).

- CVE-2016-2271: VMX when using an Intel or Cyrix CPU,
allowed local HVM guest users to cause a denial of
service (guest crash) via vectors related to a
non-canonical RIP (bsc#965317).

- CVE-2016-2391: usb: multiple eof_timers in ohci module
lead to NULL pointer dereference (bsc#967013).

- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive
(bsc#969350).

- XSA-166: ioreq handling possibly susceptible to multiple
read issue (bsc#958523).

This non-security issue was fixed :

- bsc#967630: Discrepancy in reported memory size with
correction XSA-153 for xend

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/864391
https://bugzilla.suse.com/864655
https://bugzilla.suse.com/864769
https://bugzilla.suse.com/864805
https://bugzilla.suse.com/864811
https://bugzilla.suse.com/877642
https://bugzilla.suse.com/897654
https://bugzilla.suse.com/901508
https://bugzilla.suse.com/902737
https://bugzilla.suse.com/945989
https://bugzilla.suse.com/957162
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/958007
https://bugzilla.suse.com/958009
https://bugzilla.suse.com/958491
https://bugzilla.suse.com/958523
https://bugzilla.suse.com/959005
https://bugzilla.suse.com/960707
https://bugzilla.suse.com/960725
https://bugzilla.suse.com/960861
https://bugzilla.suse.com/960862
https://bugzilla.suse.com/961691
https://bugzilla.suse.com/963782
https://bugzilla.suse.com/965315
https://bugzilla.suse.com/965317
https://bugzilla.suse.com/967013
https://bugzilla.suse.com/967630
https://bugzilla.suse.com/969350
https://www.suse.com/security/cve/CVE-2013-4533.html
https://www.suse.com/security/cve/CVE-2013-4534.html
https://www.suse.com/security/cve/CVE-2013-4537.html
https://www.suse.com/security/cve/CVE-2013-4538.html
https://www.suse.com/security/cve/CVE-2013-4539.html
https://www.suse.com/security/cve/CVE-2014-0222.html
https://www.suse.com/security/cve/CVE-2014-3640.html
https://www.suse.com/security/cve/CVE-2014-3689.html
https://www.suse.com/security/cve/CVE-2014-7815.html
https://www.suse.com/security/cve/CVE-2015-5278.html
https://www.suse.com/security/cve/CVE-2015-7512.html
https://www.suse.com/security/cve/CVE-2015-8504.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8554.html
https://www.suse.com/security/cve/CVE-2015-8555.html
https://www.suse.com/security/cve/CVE-2015-8558.html
https://www.suse.com/security/cve/CVE-2015-8743.html
https://www.suse.com/security/cve/CVE-2015-8745.html
https://www.suse.com/security/cve/CVE-2016-1570.html
https://www.suse.com/security/cve/CVE-2016-1571.html
https://www.suse.com/security/cve/CVE-2016-1714.html
https://www.suse.com/security/cve/CVE-2016-1981.html
https://www.suse.com/security/cve/CVE-2016-2270.html
https://www.suse.com/security/cve/CVE-2016-2271.html
https://www.suse.com/security/cve/CVE-2016-2391.html
https://www.suse.com/security/cve/CVE-2016-2841.html
http://www.nessus.org/u?b449ab58

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 11-SP2-LTSS :

zypper in -t patch slessp2-xen-12530=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false