rpm package
suse/xen&distro=SUSE Linux Enterprise Software Development Kit 11 SP4
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4
Vulnerabilities (201)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-6815 | — | < 4.4.3_02-26.2 | 4.4.3_02-26.2 | Jan 31, 2020 | The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors. | ||
| CVE-2015-5239 | — | < 4.4.3_02-26.2 | 4.4.3_02-26.2 | Jan 23, 2020 | Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop. | ||
| CVE-2015-5278 | — | < 4.4.4_02-32.1 | 4.4.4_02-32.1 | Jan 23, 2020 | The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets. | ||
| CVE-2019-9824 | — | < 4.4.4_40-61.43.2 | 4.4.4_40-61.43.2 | Jun 3, 2019 | tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure. | ||
| CVE-2018-18849 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Mar 17, 2019 | In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value. | ||
| CVE-2019-6778 | — | < 4.4.4_40-61.43.2 | 4.4.4_40-61.43.2 | Mar 17, 2019 | In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow. | ||
| CVE-2018-19967 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix. | ||
| CVE-2018-19966 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be | ||
| CVE-2018-19965 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a | ||
| CVE-2018-19962 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones. | ||
| CVE-2018-19961 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes. | ||
| CVE-2018-19665 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Dec 6, 2018 | The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption. | ||
| CVE-2018-18438 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Oct 19, 2018 | Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value. | ||
| CVE-2018-10839 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Oct 16, 2018 | Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting | ||
| CVE-2018-17958 | Hig | 7.5 | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Oct 9, 2018 | Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used. | |
| CVE-2018-17963 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Oct 9, 2018 | qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. | ||
| CVE-2018-17962 | — | < 4.4.4_38-61.40.1 | 4.4.4_38-61.40.1 | Oct 9, 2018 | Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used. | ||
| CVE-2018-3646 | — | < 4.4.4_36-61.37.2 | 4.4.4_36-61.37.2 | Aug 14, 2018 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | ||
| CVE-2016-9603 | — | < 4.4.4_16-54.1 | 4.4.4_16-54.1 | Jul 27, 2018 | A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest c | ||
| CVE-2017-2633 | — | < 4.4.4_16-54.1 | 4.4.4_16-54.1 | Jul 27, 2018 | An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU pro |
- CVE-2015-6815Jan 31, 2020affected < 4.4.3_02-26.2fixed 4.4.3_02-26.2
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
- CVE-2015-5239Jan 23, 2020affected < 4.4.3_02-26.2fixed 4.4.3_02-26.2
Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
- CVE-2015-5278Jan 23, 2020affected < 4.4.4_02-32.1fixed 4.4.4_02-32.1
The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
- CVE-2019-9824Jun 3, 2019affected < 4.4.4_40-61.43.2fixed 4.4.4_40-61.43.2
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
- CVE-2018-18849Mar 17, 2019affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
- CVE-2019-6778Mar 17, 2019affected < 4.4.4_40-61.43.2fixed 4.4.4_40-61.43.2
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
- CVE-2018-19967Dec 8, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
- CVE-2018-19966Dec 8, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be
- CVE-2018-19965Dec 8, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a
- CVE-2018-19962Dec 8, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
- CVE-2018-19961Dec 8, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
- CVE-2018-19665Dec 6, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
- CVE-2018-18438Oct 19, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
- CVE-2018-10839Oct 16, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting
- affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
- CVE-2018-17963Oct 9, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- CVE-2018-17962Oct 9, 2018affected < 4.4.4_38-61.40.1fixed 4.4.4_38-61.40.1
Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
- CVE-2018-3646Aug 14, 2018affected < 4.4.4_36-61.37.2fixed 4.4.4_36-61.37.2
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis
- CVE-2016-9603Jul 27, 2018affected < 4.4.4_16-54.1fixed 4.4.4_16-54.1
A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest c
- CVE-2017-2633Jul 27, 2018affected < 4.4.4_16-54.1fixed 4.4.4_16-54.1
An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU pro
Page 1 of 11