VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP1

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Vulnerabilities (147)

  • CVE-2018-19364Dec 13, 2018
    affected < 2.3.1-33.20.1fixed 2.3.1-33.20.1

    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.

  • CVE-2018-10839Oct 16, 2018
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting

  • CVE-2018-17958HigOct 9, 2018
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

  • CVE-2018-17963Oct 9, 2018
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

  • CVE-2018-17962Oct 9, 2018
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

  • CVE-2018-15746Aug 29, 2018
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.

  • CVE-2016-9603Jul 27, 2018
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest c

  • CVE-2017-2620Jul 27, 2018
    affected < 2.3.1-32.11fixed 2.3.1-32.11

    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU pro

  • CVE-2017-7471Jul 9, 2018
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to acc

  • CVE-2017-2615Jul 2, 2018
    affected < 2.3.1-32.11fixed 2.3.1-32.11

    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process result

  • CVE-2018-12617Jun 21, 2018
    affected < 2.3.1-33.12.1fixed 2.3.1-33.12.1

    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploit

  • CVE-2018-11806Jun 13, 2018
    affected < 2.3.1-33.12.1fixed 2.3.1-33.12.1

    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.

  • CVE-2018-3639May 22, 2018
    affected < 2.3.1-33.9.4fixed 2.3.1-33.9.4

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2016-9602Apr 26, 2018
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.

  • CVE-2017-5715Jan 4, 2018
    affected < 2.3.1-33.6.1fixed 2.3.1-33.6.1

    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • CVE-2015-7549MedOct 30, 2017
    affected < 2.3.1-14.1fixed 2.3.1-14.1

    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.

  • CVE-2017-15289MedOct 16, 2017
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.

  • CVE-2017-15038MedOct 10, 2017
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.

  • CVE-2017-14167HigSep 8, 2017
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

  • CVE-2017-13672MedSep 1, 2017
    affected < 2.3.1-33.3.3fixed 2.3.1-33.3.3

    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.

Page 2 of 8