VYPR

rpm package

suse/qemu&distro=SUSE Linux Enterprise Server 12 SP3

pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3

Vulnerabilities (40)

  • CVE-2018-12130May 30, 2019
    affected < 2.9.1-6.34.1fixed 2.9.1-6.34.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 2.9.1-6.34.1fixed 2.9.1-6.34.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 2.9.1-6.34.1fixed 2.9.1-6.34.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 2.9.1-6.34.1fixed 2.9.1-6.34.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2018-18849Mar 17, 2019
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2019-6778Mar 17, 2019
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.

  • CVE-2018-16872Dec 13, 2018
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb

  • CVE-2018-19489Dec 13, 2018
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.

  • CVE-2018-19364Dec 13, 2018
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.

  • CVE-2018-18954Nov 15, 2018
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 allows out-of-bounds write or read access to PowerNV memory.

  • CVE-2018-10839Oct 16, 2018
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting

  • CVE-2018-17958HigOct 9, 2018
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

  • CVE-2018-17963Oct 9, 2018
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

  • CVE-2018-17962Oct 9, 2018
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

  • CVE-2018-15746Aug 29, 2018
    affected < 2.9.1-6.22.3fixed 2.9.1-6.22.3

    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.

  • CVE-2017-15119Jul 27, 2018
    affected < 2.9.1-6.12.1fixed 2.9.1-6.12.1

    The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep th

  • CVE-2018-12617Jun 21, 2018
    affected < 2.9.1-6.19.11fixed 2.9.1-6.19.11

    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploit

  • CVE-2018-11806Jun 13, 2018
    affected < 2.9.1-6.19.11fixed 2.9.1-6.19.11

    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.

  • CVE-2018-3639May 22, 2018
    affected < 2.9.1-6.16.1fixed 2.9.1-6.16.1

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2018-7858Mar 12, 2018
    affected < 2.9.1-6.28.1fixed 2.9.1-6.28.1

    Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.

Page 1 of 2