rpm package
suse/xen&distro=SUSE Linux Enterprise Server 12-LTSS
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS
Vulnerabilities (154)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-10806 | Med | 5.5 | < 4.4.4_22-22.51.2 | 4.4.4_22-22.51.2 | Aug 2, 2017 | Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages. | |
| CVE-2017-10664 | Hig | 7.5 | < 4.4.4_22-22.51.2 | 4.4.4_22-22.51.2 | Aug 2, 2017 | qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt. | |
| CVE-2017-11434 | Med | 5.5 | < 4.4.4_22-22.51.2 | 4.4.4_22-22.51.2 | Jul 25, 2017 | The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string. | |
| CVE-2017-7980 | Hig | 7.8 | < 4.4.4_18-22.39.1 | 4.4.4_18-22.39.1 | Jul 25, 2017 | Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation. | |
| CVE-2017-10922 | Hig | 7.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3. | |
| CVE-2017-10921 | Cri | 10.0 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka X | |
| CVE-2017-10920 | Cri | 10.0 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged ho | |
| CVE-2017-10918 | Cri | 10.0 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222. | |
| CVE-2017-10917 | Cri | 9.1 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221. | |
| CVE-2017-10915 | Cri | 9.0 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219. | |
| CVE-2017-10914 | Hig | 8.1 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2. | |
| CVE-2017-10913 | Cri | 9.8 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1. | |
| CVE-2017-10912 | Cri | 10.0 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. | |
| CVE-2017-10911 | Med | 6.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jul 5, 2017 | The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interfac | |
| CVE-2017-9503 | Med | 5.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jun 16, 2017 | QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing. | |
| CVE-2017-9374 | Med | 5.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jun 16, 2017 | Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device. | |
| CVE-2017-9330 | Med | 5.6 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | Jun 8, 2017 | QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505. | |
| CVE-2017-8309 | Hig | 7.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | May 23, 2017 | Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture. | |
| CVE-2017-8905 | Hig | 8.8 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | May 11, 2017 | Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215. | |
| CVE-2017-8112 | Med | 6.5 | < 4.4.4_21-22.42.1 | 4.4.4_21-22.42.1 | May 2, 2017 | hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count. |
- affected < 4.4.4_22-22.51.2fixed 4.4.4_22-22.51.2
Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
- affected < 4.4.4_22-22.51.2fixed 4.4.4_22-22.51.2
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
- affected < 4.4.4_22-22.51.2fixed 4.4.4_22-22.51.2
The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
- affected < 4.4.4_18-22.39.1fixed 4.4.4_18-22.39.1
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka X
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged ho
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interfac
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
- affected < 4.4.4_21-22.42.1fixed 4.4.4_21-22.42.1
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
Page 4 of 8