VYPR

rpm package

suse/libvirt&distro=SUSE Linux Enterprise Desktop 12 SP3

pkg:rpm/suse/libvirt&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3

Vulnerabilities (12)

  • CVE-2018-12130May 30, 2019
    affected < 3.3.0-5.33.2fixed 3.3.0-5.33.2

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 3.3.0-5.33.2fixed 3.3.0-5.33.2

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 3.3.0-5.33.2fixed 3.3.0-5.33.2

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 3.3.0-5.33.2fixed 3.3.0-5.33.2

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2019-3886Apr 4, 2019
    affected < 3.3.0-5.30.1fixed 3.3.0-5.30.1

    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.

  • CVE-2019-3840Mar 27, 2019
    affected < 3.3.0-5.30.1fixed 3.3.0-5.30.1

    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.

  • CVE-2018-3639May 22, 2018
    affected < 3.3.0-5.22.1fixed 3.3.0-5.22.1

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2018-1064Mar 28, 2018
    affected < 3.3.0-5.19.2fixed 3.3.0-5.19.2

    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.

  • CVE-2018-6764Feb 23, 2018
    affected < 3.3.0-5.19.2fixed 3.3.0-5.19.2

    util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.

  • CVE-2018-5748Jan 25, 2018
    affected < 3.3.0-5.13.1fixed 3.3.0-5.13.1

    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.

  • CVE-2017-5715Jan 4, 2018
    affected < 3.3.0-5.19.2fixed 3.3.0-5.19.2

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2017-1000256HigOct 31, 2017
    affected < 3.3.0-5.8.1fixed 3.3.0-5.8.1

    libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.