VYPR

rpm package

suse/xen&distro=SUSE Manager 2.1

pkg:rpm/suse/xen&distro=SUSE%20Manager%202.1

Vulnerabilities (54)

  • CVE-2016-9603Jul 27, 2018
    affected < 4.2.5_21-41.1fixed 4.2.5_21-41.1

    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest c

  • CVE-2017-2620Jul 27, 2018
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU pro

  • CVE-2017-2615Jul 2, 2018
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process result

  • CVE-2017-7980HigJul 25, 2017
    affected < 4.2.5_21-41.1fixed 4.2.5_21-41.1

    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.

  • CVE-2017-7995LowMay 3, 2017
    affected < 4.2.5_21-41.1fixed 4.2.5_21-41.1

    Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5

  • CVE-2017-7718MedApr 20, 2017
    affected < 4.2.5_21-41.1fixed 4.2.5_21-41.1

    hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functi

  • CVE-2017-7228HigApr 4, 2017
    affected < 4.2.5_21-38.1fixed 4.2.5_21-38.1

    An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provid

  • CVE-2016-9922MedMar 27, 2017
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.

  • CVE-2016-10155MedMar 15, 2017
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.

  • CVE-2017-6505MedMar 15, 2017
    affected < 4.2.5_21-38.1fixed 4.2.5_21-38.1

    The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-93

  • CVE-2017-6414MedMar 15, 2017
    affected < 4.2.5_21-38.1fixed 4.2.5_21-38.1

    Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.

  • CVE-2016-9637HigFeb 17, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.

  • CVE-2016-9932LowJan 26, 2017
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.

  • CVE-2016-10024MedJan 26, 2017
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.

  • CVE-2016-10013HigJan 26, 2017
    affected < 4.2.5_21-35.1fixed 4.2.5_21-35.1

    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.

  • CVE-2016-9386HigJan 23, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.

  • CVE-2016-9383HigJan 23, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instruction

  • CVE-2016-9382HigJan 23, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to st

  • CVE-2016-9381HigJan 23, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

  • CVE-2016-9380HigJan 23, 2017
    affected < 4.2.5_21-30.1fixed 4.2.5_21-30.1

    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.

Page 1 of 3