rpm package
suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP1
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1
Vulnerabilities (234)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-7550 | — | < 4.5.5_24-22.46.1 | 4.5.5_24-22.46.1 | Mar 1, 2018 | The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access. | ||
| CVE-2018-5683 | — | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Jan 23, 2018 | The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation. | ||
| CVE-2017-18030 | — | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Jan 23, 2018 | The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. | ||
| CVE-2017-5754 | — | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. | ||
| CVE-2017-5753 | — | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-5715 | — | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Jan 4, 2018 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. | ||
| CVE-2017-17566 | Hig | 7.8 | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Dec 12, 2017 | An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page. | |
| CVE-2017-17565 | Med | 5.6 | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Dec 12, 2017 | An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P. | |
| CVE-2017-17564 | Hig | 7.8 | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Dec 12, 2017 | An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode. | |
| CVE-2017-17563 | Hig | 7.8 | < 4.5.5_24-22.43.1 | 4.5.5_24-22.43.1 | Dec 12, 2017 | An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode. | |
| CVE-2017-15597 | Cri | 9.1 | < 4.5.5_20-22.36.3 | 4.5.5_20-22.36.3 | Oct 30, 2017 | An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a g | |
| CVE-2015-7549 | Med | 6.0 | < 4.5.2_06-7.1 | 4.5.2_06-7.1 | Oct 30, 2017 | The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method. | |
| CVE-2017-15595 | Hig | 8.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking. | |
| CVE-2017-15594 | Hig | 8.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging. | |
| CVE-2017-15593 | Med | 6.5 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled. | |
| CVE-2017-15592 | Hig | 8.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests. | |
| CVE-2017-15591 | Med | 6.5 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen 4.5.x through 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation. | |
| CVE-2017-15590 | Hig | 8.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled. | |
| CVE-2017-15589 | Med | 6.5 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory. | |
| CVE-2017-15588 | Hig | 7.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry. |
- CVE-2018-7550Mar 1, 2018affected < 4.5.5_24-22.46.1fixed 4.5.5_24-22.46.1
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
- CVE-2018-5683Jan 23, 2018affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
- CVE-2017-18030Jan 23, 2018affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.
- CVE-2017-5754Jan 4, 2018affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
- CVE-2017-5753Jan 4, 2018affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- CVE-2017-5715Jan 4, 2018affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
- affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.
- affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.
- affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.
- affected < 4.5.5_24-22.43.1fixed 4.5.5_24-22.43.1
An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
- affected < 4.5.5_20-22.36.3fixed 4.5.5_20-22.36.3
An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a g
- affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen 4.5.x through 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
Page 4 of 12