SuSE 10 Security Update : Xen (ZYPP Patch Number 7547)

medium Nessus Plugin ID 57265
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote SuSE 10 host is missing a security-related patch.


This collective June/2011 Update for Xen provides the following fixes :

- Xen does not properly check the upper boundary of user-supplied data in the get_free_port() function when getting a new event channel port. A local user on the guest operating system can exploit this flaw to cause denial of service conditions or potentially gain elevated privileges. (CVE-2011-1166)

- 654798: Fix race between hotplug scripts writing to xenstore and xend registering a watch for the write.

- 684297: HVM taking too long to dump vmcore

- 688757: Fix kernel panic on fully virtualized setup

- 658413: Fix root drive search on SLES 10-SP3 HVM guest

- 675363: Random lockups with kernel-xen related to graphics


Apply ZYPP patch number 7547.

See Also

Plugin Details

Severity: Medium

ID: 57265

File Name: suse_xen-201106-7547.nasl

Version: 1.7

Type: local

Agent: unix

Published: 12/13/2011

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Low

Score: 3.7


Risk Factor: Medium

Base Score: 5.5

Vector: AV:A/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 6/2/2011

Reference Information

CVE: CVE-2011-1166