VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP4

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Vulnerabilities (148)

  • CVE-2019-17341Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.

  • CVE-2019-17342Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.

  • CVE-2019-17343Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.

  • CVE-2019-17344Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.

  • CVE-2019-17345Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.

  • CVE-2019-17346Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.

  • CVE-2019-17347Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).

  • CVE-2019-17348Oct 8, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.

  • CVE-2019-12068Sep 24, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an

  • CVE-2019-15890Sep 6, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

  • CVE-2019-14378Jul 29, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

  • CVE-2019-9824Jun 3, 2019
    affected < 4.11.1_04-2.6.1fixed 4.11.1_04-2.6.1

    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • CVE-2018-12130May 30, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found

  • CVE-2019-11091May 30, 2019
    affected < 4.11.2_02-2.14.2fixed 4.11.2_02-2.14.2

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c

  • CVE-2018-18849Mar 17, 2019
    affected < 4.11.1_02-2.3.1fixed 4.11.1_02-2.3.1

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2019-6778Mar 17, 2019
    affected < 4.11.1_04-2.6.1fixed 4.11.1_04-2.6.1

    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.

  • CVE-2018-19967Dec 8, 2018
    affected < 4.11.1_02-2.3.1fixed 4.11.1_02-2.3.1

    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.

  • CVE-2018-19966Dec 8, 2018
    affected < 4.11.1_02-2.3.1fixed 4.11.1_02-2.3.1

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be

Page 7 of 8