SUSE: 2019:14199-1 important: xen

    Date 24 Oct 2019
    635
    Posted By LinuxSecurity Advisories
    An update that fixes 13 vulnerabilities is now available.
    
       SUSE Security Update: Security update for xen
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:14199-1
    Rating:             important
    References:         #1126140 #1126141 #1126192 #1126195 #1126196 
                        #1126198 #1126201 #1127400 #1135905 #1143797 
                        #1145652 #1146874 #1149813 
    Cross-References:   CVE-2019-12067 CVE-2019-12068 CVE-2019-12155
                        CVE-2019-14378 CVE-2019-15890 CVE-2019-17340
                        CVE-2019-17341 CVE-2019-17342 CVE-2019-17343
                        CVE-2019-17344 CVE-2019-17346 CVE-2019-17347
                        CVE-2019-17348
    Affected Products:
                        SUSE Linux Enterprise Server 11-SP4-LTSS
                        SUSE Linux Enterprise Debuginfo 11-SP4
    ______________________________________________________________________________
    
       An update that fixes 13 vulnerabilities is now available.
    
    Description:
    
       This update for xen fixes the following issues:
    
       - CVE-2019-15890: Fixed a use-after-free in SLiRP networking
         implementation of QEMU emulator which could have led to Denial of
         Service (bsc#1149813).
       - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite
         loop and denial of service (bsc#1146874).
       - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking
         implementation of QEMU emulator which could have led to execution of
         arbitrary code with privileges of the QEMU process (bsc#1143797).
       - CVE-2019-12067: Fixed a null pointer dereference which could have led to
         denial of service (bsc#1145652).
       - CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card
         emulator of QEMU which could have led to denial of service (bsc#1135905).
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Server 11-SP4-LTSS:
    
          zypper in -t patch slessp4-xen-14199=1
    
       - SUSE Linux Enterprise Debuginfo 11-SP4:
    
          zypper in -t patch dbgsp4-xen-14199=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):
    
          xen-kmp-default-4.4.4_40_3.0.101_108.101-61.49.1
          xen-libs-4.4.4_40-61.49.1
          xen-tools-domU-4.4.4_40-61.49.1
    
       - SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64):
    
          xen-4.4.4_40-61.49.1
          xen-doc-html-4.4.4_40-61.49.1
          xen-libs-32bit-4.4.4_40-61.49.1
          xen-tools-4.4.4_40-61.49.1
    
       - SUSE Linux Enterprise Server 11-SP4-LTSS (i586):
    
          xen-kmp-pae-4.4.4_40_3.0.101_108.101-61.49.1
    
       - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
    
          xen-debuginfo-4.4.4_40-61.49.1
          xen-debugsource-4.4.4_40-61.49.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-12067.html
       https://www.suse.com/security/cve/CVE-2019-12068.html
       https://www.suse.com/security/cve/CVE-2019-12155.html
       https://www.suse.com/security/cve/CVE-2019-14378.html
       https://www.suse.com/security/cve/CVE-2019-15890.html
       https://www.suse.com/security/cve/CVE-2019-17340.html
       https://www.suse.com/security/cve/CVE-2019-17341.html
       https://www.suse.com/security/cve/CVE-2019-17342.html
       https://www.suse.com/security/cve/CVE-2019-17343.html
       https://www.suse.com/security/cve/CVE-2019-17344.html
       https://www.suse.com/security/cve/CVE-2019-17346.html
       https://www.suse.com/security/cve/CVE-2019-17347.html
       https://www.suse.com/security/cve/CVE-2019-17348.html
       https://bugzilla.suse.com/1126140
       https://bugzilla.suse.com/1126141
       https://bugzilla.suse.com/1126192
       https://bugzilla.suse.com/1126195
       https://bugzilla.suse.com/1126196
       https://bugzilla.suse.com/1126198
       https://bugzilla.suse.com/1126201
       https://bugzilla.suse.com/1127400
       https://bugzilla.suse.com/1135905
       https://bugzilla.suse.com/1143797
       https://bugzilla.suse.com/1145652
       https://bugzilla.suse.com/1146874
       https://bugzilla.suse.com/1149813
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"23","type":"x","order":"1","pct":95.83,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":4.17,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.