VYPR

rpm package

suse/libvirt&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/libvirt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (15)

  • CVE-2020-15708Nov 6, 2020
    affected < 2.0.0-27.64.1fixed 2.0.0-27.64.1

    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.

  • CVE-2020-25637Oct 6, 2020
    affected < 2.0.0-27.64.1fixed 2.0.0-27.64.1

    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-w

  • CVE-2019-10167Aug 2, 2019
    affected < 2.0.0-27.61.1fixed 2.0.0-27.61.1

    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities.

  • CVE-2019-10161Jul 30, 2019
    affected < 2.0.0-27.61.1fixed 2.0.0-27.61.1

    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirt

  • CVE-2018-12130May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2019-3886Apr 4, 2019
    affected < 2.0.0-27.54.1fixed 2.0.0-27.54.1

    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.

  • CVE-2019-3840Mar 27, 2019
    affected < 2.0.0-27.48.1fixed 2.0.0-27.48.1

    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.

  • CVE-2018-3639May 22, 2018
    affected < 2.0.0-27.42.1fixed 2.0.0-27.42.1

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2018-1064Mar 28, 2018
    affected < 2.0.0-27.34.1fixed 2.0.0-27.34.1

    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.

  • CVE-2018-6764Feb 23, 2018
    affected < 2.0.0-27.34.1fixed 2.0.0-27.34.1

    util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.

  • CVE-2018-5748Jan 25, 2018
    affected < 2.0.0-27.29.1fixed 2.0.0-27.29.1

    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.

  • CVE-2017-5715Jan 4, 2018
    affected < 2.0.0-27.34.1fixed 2.0.0-27.34.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.