VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Software Development Kit 12

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012

Vulnerabilities (84)

  • CVE-2016-2392MedJun 16, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process cra

  • CVE-2016-2391MedJun 16, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.

  • CVE-2015-8558MedMay 23, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.

  • CVE-2015-8554HigApr 14, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X

  • CVE-2015-8550HigApr 14, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.

  • CVE-2015-8555HigApr 13, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.

  • CVE-2016-1568HigApr 12, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.

  • CVE-2016-1714HigApr 7, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access

  • CVE-2016-2271MedFeb 19, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.

  • CVE-2016-2270MedFeb 19, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.

  • CVE-2016-1571MedJan 22, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction

  • CVE-2016-1570HigJan 22, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_

  • CVE-2015-1779HigJan 12, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.

  • CVE-2015-7512CriJan 8, 2016
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

  • CVE-2015-8341Dec 17, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by startin

  • CVE-2015-8340Dec 17, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

  • CVE-2015-8339Dec 17, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

  • CVE-2015-8104CriNov 16, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.

  • CVE-2015-5307Nov 16, 2015
    affected < 4.4.3_06-22.15.1fixed 4.4.3_06-22.15.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

  • CVE-2015-6855HigNov 6, 2015
    affected < 4.4.4_02-22.19.1fixed 4.4.4_02-22.19.1

    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive,

Page 2 of 5