Description: | Summary: The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2013:1314-1 advisory.
Vulnerability Insight: The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various bugs and security issues:
The following security issues have been addressed:
* CVE-2013-2194: Various integer overflows in the ELF loader were fixed. (XSA-55) * CVE-2013-2195: Various pointer dereferences issues in the ELF loader were fixed. (XSA-55) * CVE-2013-2196: Various other problems in the ELF loader were fixed. (XSA-55) * CVE-2013-2078: A Hypervisor crash due to missing exception recovery on XSETBV was fixed. (XSA-54) * CVE-2013-2077: A Hypervisor crash due to missing exception recovery on XRSTOR was fixed. (XSA-53) * CVE-2013-2211: libxl allowed guest write access to sensitive console related xenstore keys. (XSA-57) * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs (XSA-52) was fixed, where parts of this state could leak to other VMs.
Also the following bugs have been fixed:
* performance issues in mirror lvm (bnc#801663) * aacraid driver panics mapping INT A when booting kernel-xen (bnc#808085) * Fully Virtualized Windows VM install failed on Ivy Bridge platforms with Xen kernel (bnc#808269) * Did not boot with i915 graphics controller with VT-d enabled (bnc#817210)
Security Issue references:
* CVE-2013-2194 > * CVE-2013-2195 > * CVE-2013-2196 >
Affected Software/OS: 'Xen' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP3.
Solution: Please install the updated package(s).
CVSS Score: 7.4
CVSS Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C
|