VYPR

rpm package

suse/libvirt&distro=SUSE Linux Enterprise Server 12 SP2-BCL

pkg:rpm/suse/libvirt&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Vulnerabilities (12)

  • CVE-2020-15708Nov 6, 2020
    affected < 2.0.0-27.64.1fixed 2.0.0-27.64.1

    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

  • CVE-2020-25637Oct 6, 2020
    affected < 2.0.0-27.64.1fixed 2.0.0-27.64.1

    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-w

  • CVE-2019-10167Aug 2, 2019
    affected < 2.0.0-27.61.1fixed 2.0.0-27.61.1

    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities.

  • CVE-2019-10161Jul 30, 2019
    affected < 2.0.0-27.61.1fixed 2.0.0-27.61.1

    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirt

  • CVE-2018-12130May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2019-3886Apr 4, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.

  • CVE-2019-3840Mar 27, 2019
    affected < 2.0.0-27.48.1fixed 2.0.0-27.48.1

    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.

  • CVE-2018-3639May 22, 2018
    affected < 2.0.0-27.42.1fixed 2.0.0-27.42.1

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2017-5715Jan 4, 2018
    affected < 2.0.0-27.45.1fixed 2.0.0-27.45.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.