Description: | Summary: The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2012:1615-1 advisory.
Vulnerability Insight: This update fixes the following security issues in xen:
* CVE-2012-5510: Grant table version switch list corruption vulnerability (XSA-26) * CVE-2012-5511: Several HVM operations do not validate the range of their inputs (XSA-27) * CVE-2012-5512: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak (XSA-28) * CVE-2012-5513: XENMEM_exchange may overwrite hypervisor memory (XSA-29) * CVE-2012-5514: Missing unlock in guest_physmap_mark_populate_on_demand() (XSA-30) * CVE-2012-5515: Several memory hypercall operations allow invalid extent order values (XSA-31)
Also the following bugs have been fixed and upstream patches have been applied:
* FATAL PAGE FAULT in hypervisor (arch_do_domctl) * 25931-x86-domctl-iomem-mapping-checks.patch * 26132-tmem-save-NULL-check.patch * 26134-x86-shadow-invlpg-check.patch * 26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch) * 26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch) * 26150-x86-shadow-unhook-toplevel-check.patch (Replaces CVE-2012-4538-xsa23.patch) * 26151-gnttab-compat-get-status-frames.patch (Replaces CVE-2012-4539-xsa24.patch) * bnc#792476 - efi files missing in latest XEN update
Security Issue references:
* CVE-2012-5512 > * CVE-2012-5513 > * CVE-2012-5514 > * CVE-2012-5511 > * CVE-2012-5510 > * CVE-2012-5515 >
Affected Software/OS: 'Xen' package(s) on SUSE Linux Enterprise Desktop 11-SP2, SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Software Development Kit 11-SP2.
Solution: Please install the updated package(s).
CVSS Score: 6.9
CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
|