SUSE: 2019:2783-1 important: xen

    Date 25 Oct 2019
    640
    Posted By LinuxSecurity Advisories
    An update that fixes 11 vulnerabilities is now available.
    
       SUSE Security Update: Security update for xen
    ______________________________________________________________________________
    
    Announcement ID:    SUSE-SU-2019:2783-1
    Rating:             important
    References:         #1126140 #1126141 #1126192 #1126195 #1126196 
                        #1126198 #1126201 #1127400 #1143797 #1146874 
                        #1149813 
    Cross-References:   CVE-2019-12068 CVE-2019-14378 CVE-2019-15890
                        CVE-2019-17340 CVE-2019-17341 CVE-2019-17342
                        CVE-2019-17343 CVE-2019-17344 CVE-2019-17346
                        CVE-2019-17347 CVE-2019-17348
    Affected Products:
                        SUSE OpenStack Cloud 7
                        SUSE Linux Enterprise Server for SAP 12-SP2
                        SUSE Linux Enterprise Server 12-SP2-LTSS
                        SUSE Linux Enterprise Server 12-SP2-BCL
                        SUSE Enterprise Storage 4
    ______________________________________________________________________________
    
       An update that fixes 11 vulnerabilities is now available.
    
    Description:
    
       This update for xen fixes the following issues:
    
       - CVE-2019-15890: Fixed a use-after-free in SLiRP networking
         implementation of QEMU emulator which could have led to Denial of
         Service (bsc#1149813).
       - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite
         loop and denial of service (bsc#1146874).
       - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking
         implementation of QEMU emulator which could have led to execution of
         arbitrary code with privileges of the QEMU process (bsc#1143797).
    
    
    Patch Instructions:
    
       To install this SUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - SUSE OpenStack Cloud 7:
    
          zypper in -t patch SUSE-OpenStack-Cloud-7-2019-2783=1
    
       - SUSE Linux Enterprise Server for SAP 12-SP2:
    
          zypper in -t patch SUSE-SLE-SAP-12-SP2-2019-2783=1
    
       - SUSE Linux Enterprise Server 12-SP2-LTSS:
    
          zypper in -t patch SUSE-SLE-SERVER-12-SP2-2019-2783=1
    
       - SUSE Linux Enterprise Server 12-SP2-BCL:
    
          zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2019-2783=1
    
       - SUSE Enterprise Storage 4:
    
          zypper in -t patch SUSE-Storage-4-2019-2783=1
    
    
    
    Package List:
    
       - SUSE OpenStack Cloud 7 (x86_64):
    
          xen-4.7.6_06-43.54.2
          xen-debugsource-4.7.6_06-43.54.2
          xen-doc-html-4.7.6_06-43.54.2
          xen-libs-32bit-4.7.6_06-43.54.2
          xen-libs-4.7.6_06-43.54.2
          xen-libs-debuginfo-32bit-4.7.6_06-43.54.2
          xen-libs-debuginfo-4.7.6_06-43.54.2
          xen-tools-4.7.6_06-43.54.2
          xen-tools-debuginfo-4.7.6_06-43.54.2
          xen-tools-domU-4.7.6_06-43.54.2
          xen-tools-domU-debuginfo-4.7.6_06-43.54.2
    
       - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
    
          xen-4.7.6_06-43.54.2
          xen-debugsource-4.7.6_06-43.54.2
          xen-doc-html-4.7.6_06-43.54.2
          xen-libs-32bit-4.7.6_06-43.54.2
          xen-libs-4.7.6_06-43.54.2
          xen-libs-debuginfo-32bit-4.7.6_06-43.54.2
          xen-libs-debuginfo-4.7.6_06-43.54.2
          xen-tools-4.7.6_06-43.54.2
          xen-tools-debuginfo-4.7.6_06-43.54.2
          xen-tools-domU-4.7.6_06-43.54.2
          xen-tools-domU-debuginfo-4.7.6_06-43.54.2
    
       - SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
    
          xen-4.7.6_06-43.54.2
          xen-debugsource-4.7.6_06-43.54.2
          xen-doc-html-4.7.6_06-43.54.2
          xen-libs-32bit-4.7.6_06-43.54.2
          xen-libs-4.7.6_06-43.54.2
          xen-libs-debuginfo-32bit-4.7.6_06-43.54.2
          xen-libs-debuginfo-4.7.6_06-43.54.2
          xen-tools-4.7.6_06-43.54.2
          xen-tools-debuginfo-4.7.6_06-43.54.2
          xen-tools-domU-4.7.6_06-43.54.2
          xen-tools-domU-debuginfo-4.7.6_06-43.54.2
    
       - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
    
          xen-4.7.6_06-43.54.2
          xen-debugsource-4.7.6_06-43.54.2
          xen-doc-html-4.7.6_06-43.54.2
          xen-libs-32bit-4.7.6_06-43.54.2
          xen-libs-4.7.6_06-43.54.2
          xen-libs-debuginfo-32bit-4.7.6_06-43.54.2
          xen-libs-debuginfo-4.7.6_06-43.54.2
          xen-tools-4.7.6_06-43.54.2
          xen-tools-debuginfo-4.7.6_06-43.54.2
          xen-tools-domU-4.7.6_06-43.54.2
          xen-tools-domU-debuginfo-4.7.6_06-43.54.2
    
       - SUSE Enterprise Storage 4 (x86_64):
    
          xen-4.7.6_06-43.54.2
          xen-debugsource-4.7.6_06-43.54.2
          xen-doc-html-4.7.6_06-43.54.2
          xen-libs-32bit-4.7.6_06-43.54.2
          xen-libs-4.7.6_06-43.54.2
          xen-libs-debuginfo-32bit-4.7.6_06-43.54.2
          xen-libs-debuginfo-4.7.6_06-43.54.2
          xen-tools-4.7.6_06-43.54.2
          xen-tools-debuginfo-4.7.6_06-43.54.2
          xen-tools-domU-4.7.6_06-43.54.2
          xen-tools-domU-debuginfo-4.7.6_06-43.54.2
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-12068.html
       https://www.suse.com/security/cve/CVE-2019-14378.html
       https://www.suse.com/security/cve/CVE-2019-15890.html
       https://www.suse.com/security/cve/CVE-2019-17340.html
       https://www.suse.com/security/cve/CVE-2019-17341.html
       https://www.suse.com/security/cve/CVE-2019-17342.html
       https://www.suse.com/security/cve/CVE-2019-17343.html
       https://www.suse.com/security/cve/CVE-2019-17344.html
       https://www.suse.com/security/cve/CVE-2019-17346.html
       https://www.suse.com/security/cve/CVE-2019-17347.html
       https://www.suse.com/security/cve/CVE-2019-17348.html
       https://bugzilla.suse.com/1126140
       https://bugzilla.suse.com/1126141
       https://bugzilla.suse.com/1126192
       https://bugzilla.suse.com/1126195
       https://bugzilla.suse.com/1126196
       https://bugzilla.suse.com/1126198
       https://bugzilla.suse.com/1126201
       https://bugzilla.suse.com/1127400
       https://bugzilla.suse.com/1143797
       https://bugzilla.suse.com/1146874
       https://bugzilla.suse.com/1149813
    
    _______________________________________________
    sle-security-updates mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://lists.suse.com/mailman/listinfo/sle-security-updates
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"7","type":"x","order":"1","pct":100,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.