SUSE SLED10 / SLES10 Security Update : Xen (SUSE-SU-2012:1487-1)

Medium Nessus Plugin ID 83564

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote SUSE host is missing one or more security updates.

Description

XEN received various security and bugfixes :

- CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA-20)

- CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA-22)

The following additional bugs have been fixed :

- bnc#784087 - L3: Xen BUG at io_apic.c:129 26102-x86-IOAPIC-legacy-not-first.patch

- Upstream patches from Jan 25927-x86-domctl-ioport-mapping-range.patch 25931-x86-domctl-iomem-mapping-checks.patch 26061-x86-oprof-counter-range.patch 25431-x86-EDD-MBR-sig-check.patch 25480-x86_64-sysret-canonical.patch 25481-x86_64-AMD-erratum-121.patch 25485-x86_64-canonical-checks.patch 25587-param-parse-limit.patch 25589-pygrub-size-limits.patch 25744-hypercall-return-long.patch 25765-x86_64-allow-unsafe-adjust.patch 25773-x86-honor-no-real-mode.patch 25786-x86-prefer-multiboot-meminfo-over-e801.patch 25808-domain_create-return-value.patch 25814-x86_64-set-debugreg-guest.patch 24742-gnttab-misc.patch 25098-x86-emul-lock-UD.patch 25200-x86_64-trap-bounce-flags.patch 25271-x86_64-IST-index.patch bnc#651093 - win2k8 guests are unable to restore after saving the vms state ept-novell-x64.patch 23800-x86_64-guest-addr-range.patch 24168-x86-vioapic-clear-remote_irr.patch 24453-x86-vIRQ-IRR-TMR-race.patch 24456-x86-emul-lea.patch

bnc#713555 - Unable to install RHEL 6.1 x86 as a paravirtualized guest OS on SLES 10 SP4 x86 vm-install-0.2.19.tar.bz2

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected Xen packages

See Also

http://www.nessus.org/u?9eafc586

http://support.novell.com/security/cve/CVE-2012-3497.html

http://support.novell.com/security/cve/CVE-2012-4411.html

http://support.novell.com/security/cve/CVE-2012-4535.html

http://support.novell.com/security/cve/CVE-2012-4536.html

http://support.novell.com/security/cve/CVE-2012-4537.html

http://support.novell.com/security/cve/CVE-2012-4538.html

http://support.novell.com/security/cve/CVE-2012-4539.html

http://support.novell.com/security/cve/CVE-2012-4544.html

https://bugzilla.novell.com/651093

https://bugzilla.novell.com/713555

https://bugzilla.novell.com/784087

https://bugzilla.novell.com/786516

https://bugzilla.novell.com/786517

http://www.nessus.org/u?88058f84

Plugin Details

Severity: Medium

ID: 83564

File Name: suse_SU-2012-1487-1.nasl

Version: 2.3

Type: local

Agent: unix

Published: 2015/05/20

Updated: 2021/01/19

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 5.9

CVSS v2.0

Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:xen, p-cpe:/a:novell:suse_linux:xen-devel, p-cpe:/a:novell:suse_linux:xen-doc-html, p-cpe:/a:novell:suse_linux:xen-doc-pdf, p-cpe:/a:novell:suse_linux:xen-doc-ps, p-cpe:/a:novell:suse_linux:xen-kmp-bigsmp, p-cpe:/a:novell:suse_linux:xen-kmp-debug, p-cpe:/a:novell:suse_linux:xen-kmp-default, p-cpe:/a:novell:suse_linux:xen-kmp-kdump, p-cpe:/a:novell:suse_linux:xen-kmp-kdumppae, p-cpe:/a:novell:suse_linux:xen-kmp-smp, p-cpe:/a:novell:suse_linux:xen-kmp-vmi, p-cpe:/a:novell:suse_linux:xen-kmp-vmipae, p-cpe:/a:novell:suse_linux:xen-libs, p-cpe:/a:novell:suse_linux:xen-tools, p-cpe:/a:novell:suse_linux:xen-tools-domU, p-cpe:/a:novell:suse_linux:xen-tools-ioemu, cpe:/o:novell:suse_linux:10

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/11/16

Reference Information

CVE: CVE-2012-3497, CVE-2012-4411, CVE-2012-4535, CVE-2012-4536, CVE-2012-4537, CVE-2012-4538, CVE-2012-4539, CVE-2012-4544

BID: 55410, 55442, 56289, 56498