SUSE-SU-2019:14201-1: important: Security update for xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Oct 25 10:17:38 MDT 2019


   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:14201-1
Rating:             important
References:         #1047675 #1126140 #1126141 #1126192 #1126195 
                    #1126196 #1130680 #1135905 #1143797 #1145652 
                    #1146874 #1149813 
Cross-References:   CVE-2017-10806 CVE-2018-20815 CVE-2019-12067
                    CVE-2019-12068 CVE-2019-12155 CVE-2019-14378
                    CVE-2019-15890 CVE-2019-17340 CVE-2019-17341
                    CVE-2019-17342 CVE-2019-17343 CVE-2019-17344
                   
Affected Products:
                    SUSE Linux Enterprise Point of Sale 11-SP3
                    SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________

   An update that fixes 12 vulnerabilities is now available.

Description:

   This update for xen fixes the following issues:

   - CVE-2019-15890: Fixed a use-after-free in SLiRP networking
     implementation of QEMU emulator which could have led to Denial of
     Service (bsc#1149813).
   - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite
     loop and denial of service (bsc#1146874).
   - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking
     implementation of QEMU emulator which could have led to execution of
     arbitrary code with privileges of the QEMU process (bsc#1143797).
   - CVE-2019-12067: Fixed a null pointer dereference which could have led to
     denial of service (bsc#1145652).
   - CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card
     emulator of QEMU which could have led to denial of service (bsc#1135905).
   - CVE-2018-20815: Fixed a heap buffer overflow while loading device tree
     blob (bsc#1130680).
   - CVE-2017-10806: Fixed a stack buffer overflow in debug logging
     (bsc#1047675).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-xen-14201=1

   - SUSE Linux Enterprise Debuginfo 11-SP3:

      zypper in -t patch dbgsp3-xen-14201=1



Package List:

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1
      xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1
      xen-libs-4.2.5_21-45.33.1
      xen-tools-domU-4.2.5_21-45.33.1

   - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64):

      xen-debuginfo-4.2.5_21-45.33.1
      xen-debugsource-4.2.5_21-45.33.1


References:

   https://www.suse.com/security/cve/CVE-2017-10806.html
   https://www.suse.com/security/cve/CVE-2018-20815.html
   https://www.suse.com/security/cve/CVE-2019-12067.html
   https://www.suse.com/security/cve/CVE-2019-12068.html
   https://www.suse.com/security/cve/CVE-2019-12155.html
   https://www.suse.com/security/cve/CVE-2019-14378.html
   https://www.suse.com/security/cve/CVE-2019-15890.html
   https://www.suse.com/security/cve/CVE-2019-17340.html
   https://www.suse.com/security/cve/CVE-2019-17341.html
   https://www.suse.com/security/cve/CVE-2019-17342.html
   https://www.suse.com/security/cve/CVE-2019-17343.html
   https://www.suse.com/security/cve/CVE-2019-17344.html
   https://bugzilla.suse.com/1047675
   https://bugzilla.suse.com/1126140
   https://bugzilla.suse.com/1126141
   https://bugzilla.suse.com/1126192
   https://bugzilla.suse.com/1126195
   https://bugzilla.suse.com/1126196
   https://bugzilla.suse.com/1130680
   https://bugzilla.suse.com/1135905
   https://bugzilla.suse.com/1143797
   https://bugzilla.suse.com/1145652
   https://bugzilla.suse.com/1146874
   https://bugzilla.suse.com/1149813



More information about the sle-security-updates mailing list