rpm package
suse/qemu&distro=SUSE Linux Enterprise Server 12 SP2-LTSS
pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS
Vulnerabilities (31)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-10839 | — | < 2.6.2-41.46.2 | 2.6.2-41.46.2 | Oct 16, 2018 | Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting | ||
| CVE-2018-17958 | Hig | 7.5 | < 2.6.2-41.46.2 | 2.6.2-41.46.2 | Oct 9, 2018 | Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used. | |
| CVE-2018-17963 | — | < 2.6.2-41.46.2 | 2.6.2-41.46.2 | Oct 9, 2018 | qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. | ||
| CVE-2018-17962 | — | < 2.6.2-41.46.2 | 2.6.2-41.46.2 | Oct 9, 2018 | Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used. | ||
| CVE-2018-15746 | — | < 2.6.2-41.46.2 | 2.6.2-41.46.2 | Aug 29, 2018 | qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread. | ||
| CVE-2018-12617 | — | < 2.6.2-41.43.3 | 2.6.2-41.43.3 | Jun 21, 2018 | qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploit | ||
| CVE-2018-11806 | — | < 2.6.2-41.43.3 | 2.6.2-41.43.3 | Jun 13, 2018 | m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams. | ||
| CVE-2018-3639 | — | < 2.6.2-41.40.1 | 2.6.2-41.40.1 | May 22, 2018 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka | ||
| CVE-2018-7858 | — | < 2.6.2-41.49.1 | 2.6.2-41.49.1 | Mar 12, 2018 | Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display. | ||
| CVE-2017-13672 | Med | 5.5 | < 2.6.2-41.49.1 | 2.6.2-41.49.1 | Sep 1, 2017 | QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update. | |
| CVE-2017-13673 | Med | 6.5 | < 2.6.2-41.49.1 | 2.6.2-41.49.1 | Aug 29, 2017 | The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function. |
- CVE-2018-10839Oct 16, 2018affected < 2.6.2-41.46.2fixed 2.6.2-41.46.2
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting
- affected < 2.6.2-41.46.2fixed 2.6.2-41.46.2
Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
- CVE-2018-17963Oct 9, 2018affected < 2.6.2-41.46.2fixed 2.6.2-41.46.2
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- CVE-2018-17962Oct 9, 2018affected < 2.6.2-41.46.2fixed 2.6.2-41.46.2
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
- CVE-2018-15746Aug 29, 2018affected < 2.6.2-41.46.2fixed 2.6.2-41.46.2
qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
- CVE-2018-12617Jun 21, 2018affected < 2.6.2-41.43.3fixed 2.6.2-41.43.3
qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploit
- CVE-2018-11806Jun 13, 2018affected < 2.6.2-41.43.3fixed 2.6.2-41.43.3
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
- CVE-2018-3639May 22, 2018affected < 2.6.2-41.40.1fixed 2.6.2-41.40.1
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka
- CVE-2018-7858Mar 12, 2018affected < 2.6.2-41.49.1fixed 2.6.2-41.49.1
Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
- affected < 2.6.2-41.49.1fixed 2.6.2-41.49.1
QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
- affected < 2.6.2-41.49.1fixed 2.6.2-41.49.1
The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.
Page 2 of 2