Security update for Xen and libvirt
Announcement ID: | SUSE-SU-2012:0386-1 |
Rating: | low |
References: | #649209 #694863 #725169 #726332 #727515 #732782 #734826 #735403 #736824 #739585 #740165 |
Affected Products: |
An update that solves one vulnerability and has 10 fixes is now available. It includes one version update.
Description:
This collective update 2012/02 for Xen provides fixes for
the following reports:
Xen:
* 740165: Fix heap overflow in e1000 device emulation
(applicable to Xen qemu - CVE-2012-0029)
* 739585: Xen block-attach fails after repeated
attach/detach
* 727515: Fragmented packets hang network boot of HVM
guest
* 736824: Microcode patches for AMD's 15h processors
panic the system
* 732782: xm create hangs when maxmen value is enclosed
in "quotes"
* 734826: xm rename doesn't work anymore
* 694863: kexec fails in xen
* 726332: Fix considerable performance hit by previous
changeset
* 649209: Fix slow Xen live migrations
libvirt
* 735403: Fix connection with virt-manager as normal
user
virt-utils
* Add Support for creating images that can be run on
Microsoft Hyper-V host (Fix vpc file format. Add support
for fixed disks)
Security Issue references:
* CVE-2012-0029
Indications:
Every Xen user should update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-xen-201202-5796
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-xen-201202-5796
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-xen-201202-5796
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-xen-201202-5796
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):
- libvirt-devel-0.7.6-1.29.2
- xen-devel-4.0.3_21548_02-0.5.2
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
- xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
- SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 1.1.3]:
- libvirt-0.7.6-1.29.2
- libvirt-doc-0.7.6-1.29.2
- libvirt-python-0.7.6-1.29.2
- virt-utils-1.1.3-1.5.1
- xen-4.0.3_21548_02-0.5.2
- xen-doc-html-4.0.3_21548_02-0.5.2
- xen-doc-pdf-4.0.3_21548_02-0.5.2
- xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
- xen-kmp-trace-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
- xen-libs-4.0.3_21548_02-0.5.2
- xen-tools-4.0.3_21548_02-0.5.2
- xen-tools-domU-4.0.3_21548_02-0.5.2
- SUSE Linux Enterprise Server 11 SP1 (i586):
- xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 1.1.3]:
- libvirt-0.7.6-1.29.2
- libvirt-doc-0.7.6-1.29.2
- libvirt-python-0.7.6-1.29.2
- virt-utils-1.1.3-1.5.1
- xen-4.0.3_21548_02-0.5.2
- xen-kmp-default-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
- xen-libs-4.0.3_21548_02-0.5.2
- xen-tools-4.0.3_21548_02-0.5.2
- xen-tools-domU-4.0.3_21548_02-0.5.2
- SUSE Linux Enterprise Desktop 11 SP1 (i586):
- xen-kmp-pae-4.0.3_21548_02_2.6.32.54_0.3-0.5.2
References:
- http://support.novell.com/security/cve/CVE-2012-0029.html
- https://bugzilla.novell.com/649209
- https://bugzilla.novell.com/694863
- https://bugzilla.novell.com/725169
- https://bugzilla.novell.com/726332
- https://bugzilla.novell.com/727515
- https://bugzilla.novell.com/732782
- https://bugzilla.novell.com/734826
- https://bugzilla.novell.com/735403
- https://bugzilla.novell.com/736824
- https://bugzilla.novell.com/739585
- https://bugzilla.novell.com/740165
- http://download.suse.com/patch/finder/?keywords=cc26db394df4e1893e567ae94e3d664f