openSUSE Security Update: Xen: Bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:0548-1 Rating: low References: #740165 #743414 #744014 #744771 #745005 #745221 #745367 #745880 #746702 #747331 #753165 Cross-References: CVE-2012-0029 Affected Products: openSUSE 12.1 ______________________________________________________________________________ An update that solves one vulnerability and has 10 fixes is now available. Description: This is a XEN bugfix update fixing lots of bugs and one security issue. CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.1: zypper in -t patch openSUSE-2012-243 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.1 (i586 x86_64): python-virtinst-0.600.1-4.10.1 virt-manager-0.9.1-5.10.1 xen-debugsource-4.1.2_16-1.7.1 xen-devel-4.1.2_16-1.7.1 xen-kmp-default-4.1.2_16_k3.1.9_1.4-1.7.1 xen-kmp-default-debuginfo-4.1.2_16_k3.1.9_1.4-1.7.1 xen-kmp-desktop-4.1.2_16_k3.1.9_1.4-1.7.1 xen-kmp-desktop-debuginfo-4.1.2_16_k3.1.9_1.4-1.7.1 xen-libs-4.1.2_16-1.7.1 xen-libs-debuginfo-4.1.2_16-1.7.1 xen-tools-domU-4.1.2_16-1.7.1 xen-tools-domU-debuginfo-4.1.2_16-1.7.1 - openSUSE 12.1 (x86_64): xen-4.1.2_16-1.7.1 xen-doc-html-4.1.2_16-1.7.1 xen-doc-pdf-4.1.2_16-1.7.1 xen-libs-32bit-4.1.2_16-1.7.1 xen-libs-debuginfo-32bit-4.1.2_16-1.7.1 xen-tools-4.1.2_16-1.7.1 xen-tools-debuginfo-4.1.2_16-1.7.1 - openSUSE 12.1 (ia64): xen-libs-debuginfo-x86-4.1.2_16-1.7.1 xen-libs-x86-4.1.2_16-1.7.1 - openSUSE 12.1 (i586): xen-kmp-pae-4.1.2_16_k3.1.9_1.4-1.7.1 xen-kmp-pae-debuginfo-4.1.2_16_k3.1.9_1.4-1.7.1 References: http://support.novell.com/security/cve/CVE-2012-0029.html https://bugzilla.novell.com/740165 https://bugzilla.novell.com/743414 https://bugzilla.novell.com/744014 https://bugzilla.novell.com/744771 https://bugzilla.novell.com/745005 https://bugzilla.novell.com/745221 https://bugzilla.novell.com/745367 https://bugzilla.novell.com/745880 https://bugzilla.novell.com/746702 https://bugzilla.novell.com/747331 https://bugzilla.novell.com/753165