VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Server 12 SP1-LTSS

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS

Vulnerabilities (62)

  • CVE-2020-1983Apr 22, 2020
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

  • CVE-2020-1711Feb 11, 2020
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user

  • CVE-2020-8608Feb 6, 2020
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

  • CVE-2020-7039Jan 16, 2020
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.

  • CVE-2019-12068Sep 24, 2019
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an

  • CVE-2019-15890Sep 6, 2019
    affected < 2.3.1-33.29.1fixed 2.3.1-33.29.1

    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

  • CVE-2019-14378Jul 29, 2019
    affected < 2.3.1-33.26.1fixed 2.3.1-33.26.1

    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

  • CVE-2019-13164Jul 3, 2019
    affected < 2.3.1-33.26.1fixed 2.3.1-33.26.1

    qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.

  • CVE-2019-9824Jun 3, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • CVE-2018-20815May 31, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.

  • CVE-2018-12130May 30, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 2.3.1-33.23.1fixed 2.3.1-33.23.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2019-12155May 24, 2019
    affected < 2.3.1-33.26.1fixed 2.3.1-33.26.1

    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.

  • CVE-2018-18849Mar 17, 2019
    affected < 2.3.1-33.17.1fixed 2.3.1-33.17.1

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2019-6778Mar 17, 2019
    affected < 2.3.1-33.20.1fixed 2.3.1-33.20.1

    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.

  • CVE-2018-16872Dec 13, 2018
    affected < 2.3.1-33.20.1fixed 2.3.1-33.20.1

    A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb

  • CVE-2018-19489Dec 13, 2018
    affected < 2.3.1-33.20.1fixed 2.3.1-33.20.1

    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.

  • CVE-2018-19364Dec 13, 2018
    affected < 2.3.1-33.20.1fixed 2.3.1-33.20.1

    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.

Page 1 of 4