VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Vulnerabilities (187)

  • CVE-2015-5307Nov 16, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

  • CVE-2015-6855HigNov 6, 2015
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive,

  • CVE-2015-7972Oct 30, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users t

  • CVE-2015-7971Oct 30, 2015
    affected < 4.4.3_02-22.12.1fixed 4.4.3_02-22.12.1

    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in

  • CVE-2015-7970Oct 30, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-co

  • CVE-2015-7969Oct 30, 2015
    affected < 4.4.3_02-22.12.1fixed 4.4.3_02-22.12.1

    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcp

  • CVE-2015-7835Oct 30, 2015
    affected < 4.4.3_02-22.12.1fixed 4.4.3_02-22.12.1

    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

  • CVE-2015-7311Oct 1, 2015
    affected < 4.4.3_02-22.12.1fixed 4.4.3_02-22.12.1

    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.

  • CVE-2015-4037Aug 26, 2015
    affected < 4.4.3_02-22.12.1fixed 4.4.3_02-22.12.1

    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.

  • CVE-2015-5166Aug 12, 2015
    affected < 4.4.2_10-22.8.1fixed 4.4.2_10-22.8.1

    Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.

  • CVE-2015-5165Aug 12, 2015
    affected < 4.4.2_10-22.8.1fixed 4.4.2_10-22.8.1

    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

  • CVE-2015-5154Aug 12, 2015
    affected < 4.4.2_08-22.5.1fixed 4.4.2_08-22.5.1

    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.

  • CVE-2015-3259Jul 16, 2015
    affected < 4.4.2_08-22.5.1fixed 4.4.2_08-22.5.1

    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.

  • CVE-2015-4164Jun 15, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

  • CVE-2015-4163Jun 15, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.

  • CVE-2015-3209Jun 15, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

  • CVE-2015-4106Jun 3, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact vi

  • CVE-2015-4105Jun 3, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.

  • CVE-2015-4104Jun 3, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.

  • CVE-2015-4103Jun 3, 2015
    affected < 4.4.2_06-21.1fixed 4.4.2_06-21.1

    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.

Page 8 of 10