SUSE: 2019:2753-1 important: xen

    Date 23 Oct 2019
    545
    Posted By LinuxSecurity Advisories
    An update that solves 16 vulnerabilities and has four fixes is now available.
    
       SUSE Security Update: Security update for xen
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:2753-1
    Rating:             important
    References:         #1027519 #1111331 #1126140 #1126141 #1126192 
                        #1126195 #1126196 #1126197 #1126198 #1126201 
                        #1127400 #1129642 #1131811 #1137717 #1138294 
                        #1143797 #1145240 #1145774 #1146874 #1149813 
                        
    Cross-References:   CVE-2018-12126 CVE-2018-12127 CVE-2018-12130
                        CVE-2019-11091 CVE-2019-12068 CVE-2019-14378
                        CVE-2019-15890 CVE-2019-17340 CVE-2019-17341
                        CVE-2019-17342 CVE-2019-17343 CVE-2019-17344
                        CVE-2019-17345 CVE-2019-17346 CVE-2019-17347
                        CVE-2019-17348
    Affected Products:
                        SUSE Linux Enterprise Software Development Kit 12-SP4
                        SUSE Linux Enterprise Server 12-SP4
                        SUSE Linux Enterprise Desktop 12-SP4
    ______________________________________________________________________________
    
       An update that solves 16 vulnerabilities and has four fixes
       is now available.
    
    Description:
    
       This update for xen to version 4.11.2 fixes the following issues:
    
       Security issues fixed:
    
       - CVE-2019-15890: Fixed a use-after-free in SLiRP networking
         implementation of QEMU emulator which could have led to Denial of
         Service (bsc#1149813).
       - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite
         loop and denial of service (bsc#1146874).
       - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking
         implementation of QEMU emulator which could have led to execution of
         arbitrary code with privileges of the QEMU process (bsc#1143797).
    
       Other issues fixed:
    
       - Fixed an HPS bug which did not allow to install Windows Server 2016 with
         2 CPUs setting or above (bsc#1137717).
       - Fixed a segmentation fault in Libvrtd during live migration to a VM
         (bsc#1145774).
       - Fixed an issue where libxenlight could not create new domain
         (bsc#1131811).
       - Fixed an issue where attached pci devices were lost after reboot
         (bsc#1129642).
       - Fixed an issue where Xen could not pre-allocate 1 shadow page
         (bsc#1145240).
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE Linux Enterprise Software Development Kit 12-SP4:
    
          zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-2753=1
    
       - SUSE Linux Enterprise Server 12-SP4:
    
          zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-2753=1
    
       - SUSE Linux Enterprise Desktop 12-SP4:
    
          zypper in -t patch SUSE-SLE-DESKTOP-12-SP4-2019-2753=1
    
    
    
    Package List:
    
       - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 x86_64):
    
          xen-debugsource-4.11.2_02-2.14.2
          xen-devel-4.11.2_02-2.14.2
    
       - SUSE Linux Enterprise Server 12-SP4 (x86_64):
    
          xen-4.11.2_02-2.14.2
          xen-debugsource-4.11.2_02-2.14.2
          xen-doc-html-4.11.2_02-2.14.2
          xen-libs-32bit-4.11.2_02-2.14.2
          xen-libs-4.11.2_02-2.14.2
          xen-libs-debuginfo-32bit-4.11.2_02-2.14.2
          xen-libs-debuginfo-4.11.2_02-2.14.2
          xen-tools-4.11.2_02-2.14.2
          xen-tools-debuginfo-4.11.2_02-2.14.2
          xen-tools-domU-4.11.2_02-2.14.2
          xen-tools-domU-debuginfo-4.11.2_02-2.14.2
    
       - SUSE Linux Enterprise Desktop 12-SP4 (x86_64):
    
          xen-4.11.2_02-2.14.2
          xen-debugsource-4.11.2_02-2.14.2
          xen-libs-32bit-4.11.2_02-2.14.2
          xen-libs-4.11.2_02-2.14.2
          xen-libs-debuginfo-32bit-4.11.2_02-2.14.2
          xen-libs-debuginfo-4.11.2_02-2.14.2
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-12126.html
       https://www.suse.com/security/cve/CVE-2018-12127.html
       https://www.suse.com/security/cve/CVE-2018-12130.html
       https://www.suse.com/security/cve/CVE-2019-11091.html
       https://www.suse.com/security/cve/CVE-2019-12068.html
       https://www.suse.com/security/cve/CVE-2019-14378.html
       https://www.suse.com/security/cve/CVE-2019-15890.html
       https://www.suse.com/security/cve/CVE-2019-17340.html
       https://www.suse.com/security/cve/CVE-2019-17341.html
       https://www.suse.com/security/cve/CVE-2019-17342.html
       https://www.suse.com/security/cve/CVE-2019-17343.html
       https://www.suse.com/security/cve/CVE-2019-17344.html
       https://www.suse.com/security/cve/CVE-2019-17345.html
       https://www.suse.com/security/cve/CVE-2019-17346.html
       https://www.suse.com/security/cve/CVE-2019-17347.html
       https://www.suse.com/security/cve/CVE-2019-17348.html
       https://bugzilla.suse.com/1027519
       https://bugzilla.suse.com/1111331
       https://bugzilla.suse.com/1126140
       https://bugzilla.suse.com/1126141
       https://bugzilla.suse.com/1126192
       https://bugzilla.suse.com/1126195
       https://bugzilla.suse.com/1126196
       https://bugzilla.suse.com/1126197
       https://bugzilla.suse.com/1126198
       https://bugzilla.suse.com/1126201
       https://bugzilla.suse.com/1127400
       https://bugzilla.suse.com/1129642
       https://bugzilla.suse.com/1131811
       https://bugzilla.suse.com/1137717
       https://bugzilla.suse.com/1138294
       https://bugzilla.suse.com/1143797
       https://bugzilla.suse.com/1145240
       https://bugzilla.suse.com/1145774
       https://bugzilla.suse.com/1146874
       https://bugzilla.suse.com/1149813
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"23","type":"x","order":"1","pct":95.83,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":4.17,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.