VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Module for Server Applications 15 SP3

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Vulnerabilities (36)

  • CVE-2020-35504May 28, 2021
    affected < 5.2.0-103.2fixed 5.2.0-103.2

    A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system avai

  • CVE-2021-20196May 26, 2021
    affected < 5.2.0-150300.109.2fixed 5.2.0-150300.109.2

    A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on

  • CVE-2021-3527May 26, 2021
    affected < 5.2.0-103.2fixed 5.2.0-103.2

    A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array

  • CVE-2021-3409Mar 23, 2021
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on t

  • CVE-2021-3416Mar 18, 2021
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles

  • CVE-2021-20255Mar 9, 2021
    affected < 5.2.0-103.2fixed 5.2.0-103.2

    A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU p

  • CVE-2021-20263Mar 9, 2021
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstance

  • CVE-2020-17380Jan 30, 2021
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the

  • CVE-2020-27821Dec 8, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the

  • CVE-2020-25723Dec 2, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the

  • CVE-2020-29129Nov 26, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.

  • CVE-2020-29130Nov 26, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.

  • CVE-2020-25085Sep 25, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.

  • CVE-2020-14364Aug 31, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all

  • CVE-2020-8608Feb 6, 2020
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

  • CVE-2019-15890Sep 6, 2019
    affected < 5.2.0-17.1fixed 5.2.0-17.1

    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

Page 2 of 2