![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2012.0386.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2012:0386-1) |
Summary: | The remote host is missing an update for the 'Xen and libvirt' package(s) announced via the SUSE-SU-2012:0386-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Xen and libvirt' package(s) announced via the SUSE-SU-2012:0386-1 advisory. Vulnerability Insight: This collective update 2012/02 for Xen provides fixes for the following reports: Xen: * 740165: Fix heap overflow in e1000 device emulation (applicable to Xen qemu - CVE-2012-0029) * 739585: Xen block-attach fails after repeated attach/detach * 727515: Fragmented packets hang network boot of HVM guest * 736824: Microcode patches for AMD's 15h processors panic the system * 732782: xm create hangs when maxmen value is enclosed in 'quotes' * 734826: xm rename doesn't work anymore * 694863: kexec fails in xen * 726332: Fix considerable performance hit by previous changeset * 649209: Fix slow Xen live migrations libvirt * 735403: Fix connection with virt-manager as normal user virt-utils * Add Support for creating images that can be run on Microsoft Hyper-V host (Fix vpc file format. Add support for fixed disks) Security Issue references: * CVE-2012-0029 > Affected Software/OS: 'Xen and libvirt' package(s) on SUSE Linux Enterprise Desktop 11-SP1, SUSE Linux Enterprise Server 11-SP1, SUSE Linux Enterprise Software Development Kit 11-SP1. Solution: Please install the updated package(s). CVSS Score: 7.4 CVSS Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0029 47740 http://secunia.com/advisories/47740 47741 http://secunia.com/advisories/47741 47992 http://secunia.com/advisories/47992 48318 http://secunia.com/advisories/48318 50913 http://secunia.com/advisories/50913 51642 http://www.securityfocus.com/bid/51642 FEDORA-2012-8604 http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html RHSA-2012:0050 http://www.redhat.com/support/errata/RHSA-2012-0050.html RHSA-2012:0370 http://rhn.redhat.com/errata/RHSA-2012-0370.html SUSE-SU-2012:1320 http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html USN-1339-1 http://www.ubuntu.com/usn/USN-1339-1 http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0 https://bugzilla.redhat.com/show_bug.cgi?id=772075 openSUSE-SU-2012:0207 http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html qemu-processtxdesc-bo(72656) https://exchange.xforce.ibmcloud.com/vulnerabilities/72656 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |