VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (154)

  • CVE-2019-9824Jun 3, 2019
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • CVE-2018-20815May 31, 2019
    affected < 4.4.4_40-22.80.1fixed 4.4.4_40-22.80.1

    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.

  • CVE-2018-12130May 30, 2019
    affected < 4.4.4_40-22.80.1fixed 4.4.4_40-22.80.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 4.4.4_40-22.80.1fixed 4.4.4_40-22.80.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 4.4.4_40-22.80.1fixed 4.4.4_40-22.80.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 4.4.4_40-22.80.1fixed 4.4.4_40-22.80.1

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2018-18849Mar 17, 2019
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2019-6778Mar 17, 2019
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.

  • CVE-2018-19967Dec 8, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.

  • CVE-2018-19966Dec 8, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be

  • CVE-2018-19965Dec 8, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a

  • CVE-2018-19962Dec 8, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.

  • CVE-2018-19961Dec 8, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.

  • CVE-2018-19665Dec 6, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.

  • CVE-2018-18438Oct 19, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.

  • CVE-2018-10839Oct 16, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting

  • CVE-2018-17958HigOct 9, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

  • CVE-2018-17963Oct 9, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

  • CVE-2018-17962Oct 9, 2018
    affected < 4.4.4_40-22.77.1fixed 4.4.4_40-22.77.1

    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

  • CVE-2018-3646Aug 14, 2018
    affected < 4.4.4_36-22.74.1fixed 4.4.4_36-22.74.1

    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis

Page 1 of 8