VYPR

rpm package

suse/kvm&distro=SUSE Linux Enterprise Point of Sale 11 SP3

pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3

Vulnerabilities (82)

  • CVE-2020-1983Apr 22, 2020
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

  • CVE-2020-8608Feb 6, 2020
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

  • CVE-2020-7039Jan 16, 2020
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.

  • CVE-2019-12068Sep 24, 2019
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an

  • CVE-2019-15890Sep 6, 2019
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

  • CVE-2019-9824Jun 3, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • CVE-2018-20815May 31, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.

  • CVE-2018-12130May 30, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 1.4.2-53.32.1fixed 1.4.2-53.32.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2018-18849Mar 17, 2019
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2019-6778Mar 17, 2019
    affected < 1.4.2-53.38.1fixed 1.4.2-53.38.1

    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.

  • CVE-2018-18438Oct 19, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.

  • CVE-2018-10839Oct 16, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting

  • CVE-2018-17958HigOct 9, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

  • CVE-2018-17963Oct 9, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

  • CVE-2018-17962Oct 9, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

  • CVE-2018-15746Aug 29, 2018
    affected < 1.4.2-53.26.2fixed 1.4.2-53.26.2

    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.

  • CVE-2016-9603Jul 27, 2018
    affected < 1.4.2-53.11.1fixed 1.4.2-53.11.1

    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest c

Page 2 of 5