Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2012:0730-1)
Summary:The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2012:0730-1 advisory.
The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2012:0730-1 advisory.

Vulnerability Insight:
Three security issues were found in XEN.

Two security issues are fixed by this update:


CVE-2012-0217: Due to incorrect fault handling in the XEN hypervisor it was possible for a XEN guest domain administrator to execute code in the XEN host environment.


CVE-2012-0218: Also a guest user could crash the guest XEN kernel due to a protection fault bounce.

The third fix is changing the Xen behaviour on certain hardware:


CVE-2012-2934: The issue is a denial of service issue on older pre-SVM AMD CPUs (AMD Erratum 121).

AMD Erratum #121 is described in 'Revision Guide for AMD Athlon 64 and AMD Opteron Processors':
[link moved to references]
The following 130nm and 90nm (DDR1-only) AMD processors are subject to this erratum:
First-generation AMD-Opteron(tm) single and dual core processors in either 939 or 940 packages:
+ AMD Opteron(tm) 100-Series Processors
+ AMD Opteron(tm) 200-Series Processors
+ AMD Opteron(tm) 800-Series Processors
+ AMD Athlon(tm) processors in either 754,
939 or 940 packages
+ AMD Sempron(tm) processor in either 754 or 939 packages
+ AMD Turion(tm) Mobile Technology in 754 package
This issue does not effect Intel processors.
The impact of this flaw is that a malicious PV guest user can halt the host system.
As this is a hardware flaw, it is not fixable except by upgrading your hardware to a newer revision, or not allowing untrusted 64bit guestsystems.
The patch changes the behaviour of the host system booting, which makes it unable to create guest machines until a specific boot option is set.
There is a new XEN boot option 'allow_unsafe' for GRUB which allows the host to start guests again.
This is added to /boot/grub/menu.lst in the line looking like this:
kernel /boot/xen.gz .... allow_unsafe
Note: .... in this example represents the existing boot options for the host.
Security Issue references:
* CVE-2012-0217
* CVE-2012-0218
* CVE-2012-2934
>Special Instructions and Notes:
Please reboot the system after installing this update.

Affected Software/OS:
'Xen' package(s) on SUSE Linux Enterprise Software Development Kit 11 SP1, SUSE Linux Enterprise Server 11 SP1, SUSE Linux Enterprise Server 10 SP4, SUSE Linux Enterprise Server 10 SP3, SUSE Linux Enterprise Server 10 SP2, SUSE Linux Enterprise Desktop 11 SP1, SUSE Linux Enterprise Desktop 10 SP4, SLE SDK 10 SP4

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-0217
Cert/CC Advisory: TA12-164A
CERT/CC vulnerability note: VU#649219
Debian Security Information: DSA-2501 (Google Search)
Debian Security Information: DSA-2508 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-12:04
Microsoft Security Bulletin: MS12-042
NETBSD Security Advisory: NetBSD-SA2012-003
Common Vulnerability Exposure (CVE) ID: CVE-2012-0218
Common Vulnerability Exposure (CVE) ID: CVE-2012-2934
BugTraq ID: 53961
SuSE Security Announcement: openSUSE-SU-2012:1572 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1573 (Google Search)
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.