VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP1

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1

Vulnerabilities (234)

  • CVE-2015-7504HigOct 16, 2017
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

  • CVE-2017-15289MedOct 16, 2017
    affected < 4.5.5_20-22.36.3fixed 4.5.5_20-22.36.3

    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.

  • CVE-2017-14319HigSep 12, 2017
    affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1

    A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit

  • CVE-2017-14318MedSep 12, 2017
    affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1

    An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked

  • CVE-2017-14317MedSep 12, 2017
    affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1

    A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on

  • CVE-2017-14316HigSep 12, 2017
    affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1

    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the

  • CVE-2017-13672MedSep 1, 2017
    affected < 4.5.5_20-22.36.3fixed 4.5.5_20-22.36.3

    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.

  • CVE-2017-12137HigAug 24, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.

  • CVE-2017-12135HigAug 24, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.

  • CVE-2017-11334MedAug 2, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

  • CVE-2017-10806MedAug 2, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.

  • CVE-2017-10664HigAug 2, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.

  • CVE-2017-11434MedJul 25, 2017
    affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1

    The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.

  • CVE-2017-7980HigJul 25, 2017
    affected < 4.5.5_10-22.14.1fixed 4.5.5_10-22.14.1

    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.

  • CVE-2017-10922HigJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.

  • CVE-2017-10921CriJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka X

  • CVE-2017-10920CriJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged ho

  • CVE-2017-10918CriJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

  • CVE-2017-10917CriJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.

  • CVE-2017-10916HigJul 5, 2017
    affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1

    The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.

Page 5 of 12