openSUSE Security Update : xen (openSUSE-SU-2013:1953-1)

medium Nessus Plugin ID 74865
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.9


The remote openSUSE host is missing a security update.


Xen was updated to 4.2.3 c/s 26170 to fix various bugs and security issues.

Following issues were fixed :

- bnc#845520 - CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies

- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error 'No memory for trampoline'

- Improvements to block-dmmd script bnc#828623

- bnc#840196 - MTU size on Dom0 gets reset when booting DomU with e1000 device

- bnc#840592 - CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation

- bnc#841766 - CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation

- bnc#842511 - CVE-2013-4368: XSA-67: xen: Information leak through outs instruction emulation

- bnc#842512 - CVE-2013-4369: XSA-68: xen: possible null dereference when parsing vif ratelimiting info

- bnc#842513 - CVE-2013-4370: XSA-69: xen: misplaced free in ocaml xc_vcpu_getaffinity stub

- bnc#842514 - CVE-2013-4371: XSA-70: xen: use-after-free in libxl_list_cpupool under memory pressure

- bnc#842515 - CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak

- bnc#839596 - CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs

- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic.

- bnc#833796 - Xen: migration broken from xsave-capable to xsave-incapable host

- bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h” cannot power off system

- bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and sles11sp3 with xen environment, xen hypervisor will panic on multiple blades nPar.

- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic.

- bnc#835896 - vcpus not started after upgrading Dom0 from 11SP2 to SP3

- bnc#836239 - SLES 11 SP3 Xen security patch does not automatically update UEFI boot binary


Update the affected xen packages.

See Also

Plugin Details

Severity: Medium

ID: 74865

File Name: openSUSE-2013-1021.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Medium

VPR Score: 5.9

CVSS v2.0

Base Score: 5.2

Vector: AV:A/AC:M/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xen, p-cpe:/a:novell:opensuse:xen-debugsource, p-cpe:/a:novell:opensuse:xen-devel, p-cpe:/a:novell:opensuse:xen-doc-html, p-cpe:/a:novell:opensuse:xen-doc-pdf, p-cpe:/a:novell:opensuse:xen-kmp-default, p-cpe:/a:novell:opensuse:xen-kmp-default-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-desktop, p-cpe:/a:novell:opensuse:xen-kmp-desktop-debuginfo, p-cpe:/a:novell:opensuse:xen-kmp-pae, p-cpe:/a:novell:opensuse:xen-kmp-pae-debuginfo, p-cpe:/a:novell:opensuse:xen-libs, p-cpe:/a:novell:opensuse:xen-libs-32bit, p-cpe:/a:novell:opensuse:xen-libs-debuginfo, p-cpe:/a:novell:opensuse:xen-libs-debuginfo-32bit, p-cpe:/a:novell:opensuse:xen-tools, p-cpe:/a:novell:opensuse:xen-tools-debuginfo, p-cpe:/a:novell:opensuse:xen-tools-domU, p-cpe:/a:novell:opensuse:xen-tools-domU-debuginfo, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 12/5/2013

Reference Information

CVE: CVE-2013-1442, CVE-2013-4355, CVE-2013-4361, CVE-2013-4368, CVE-2013-4369, CVE-2013-4370, CVE-2013-4371, CVE-2013-4375, CVE-2013-4416