VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Desktop 12 SP1

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1

Vulnerabilities (85)

  • CVE-2016-2857HigApr 12, 2016
    affected < 2.3.1-14.1fixed 2.3.1-14.1

    The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.

  • CVE-2016-1568HigApr 12, 2016
    affected < 2.3.1-14.1fixed 2.3.1-14.1

    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.

  • CVE-2016-2858MedApr 7, 2016
    affected < 2.3.1-14.1fixed 2.3.1-14.1

    QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

  • CVE-2016-1714HigApr 7, 2016
    affected < 2.3.1-14.1fixed 2.3.1-14.1

    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access

  • CVE-2015-7512CriJan 8, 2016
    affected < 2.3.1-7.7fixed 2.3.1-7.7

    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

Page 5 of 5