|
|
Log in / Subscribe / Register

SUSE alert SUSE-SU-2019:14201-1 (xen)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2019:14201-1: important: Security update for xen
Date:  Fri, 25 Oct 2019 18:17:38 +0200 (CEST)
Message-ID:  <20191025161738.BC071F798@maintenance.suse.de>

SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:14201-1 Rating: important References: #1047675 #1126140 #1126141 #1126192 #1126195 #1126196 #1130680 #1135905 #1143797 #1145652 #1146874 #1149813 Cross-References: CVE-2017-10806 CVE-2018-20815 CVE-2019-12067 CVE-2019-12068 CVE-2019-12155 CVE-2019-14378 CVE-2019-15890 CVE-2019-17340 CVE-2019-17341 CVE-2019-17342 CVE-2019-17343 CVE-2019-17344 Affected Products: SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: This update for xen fixes the following issues: - CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator which could have led to Denial of Service (bsc#1149813). - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of service (bsc#1146874). - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU emulator which could have led to execution of arbitrary code with privileges of the QEMU process (bsc#1143797). - CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652). - CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which could have led to denial of service (bsc#1135905). - CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680). - CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-xen-14201=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-xen-14201=1 Package List: - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1 xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1 xen-libs-4.2.5_21-45.33.1 xen-tools-domU-4.2.5_21-45.33.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 x86_64): xen-debuginfo-4.2.5_21-45.33.1 xen-debugsource-4.2.5_21-45.33.1 References: https://www.suse.com/security/cve/CVE-2017-10806.html https://www.suse.com/security/cve/CVE-2018-20815.html https://www.suse.com/security/cve/CVE-2019-12067.html https://www.suse.com/security/cve/CVE-2019-12068.html https://www.suse.com/security/cve/CVE-2019-12155.html https://www.suse.com/security/cve/CVE-2019-14378.html https://www.suse.com/security/cve/CVE-2019-15890.html https://www.suse.com/security/cve/CVE-2019-17340.html https://www.suse.com/security/cve/CVE-2019-17341.html https://www.suse.com/security/cve/CVE-2019-17342.html https://www.suse.com/security/cve/CVE-2019-17343.html https://www.suse.com/security/cve/CVE-2019-17344.html https://bugzilla.suse.com/1047675 https://bugzilla.suse.com/1126140 https://bugzilla.suse.com/1126141 https://bugzilla.suse.com/1126192 https://bugzilla.suse.com/1126195 https://bugzilla.suse.com/1126196 https://bugzilla.suse.com/1130680 https://bugzilla.suse.com/1135905 https://bugzilla.suse.com/1143797 https://bugzilla.suse.com/1145652 https://bugzilla.suse.com/1146874 https://bugzilla.suse.com/1149813 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds