summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2017-12-21 08:09:38 +0100
committerSona Sarmadi <sona.sarmadi@enea.com>2017-12-21 08:09:38 +0100
commit69d40ba9fbe478eb872c2c162bb15677adec49db (patch)
tree08098c8dc9993f1ef83e6d51efcbc17e656bb182
parent61d7341281587e614cf3c7628100270f57313551 (diff)
downloadnfv-access-documentation-69d40ba9fbe478eb872c2c162bb15677adec49db.tar.gz
Updated security-report for nfv-access 1.1.1 release
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
-rw-r--r--doc/book-enea-nfv-access-security-report2838
1 files changed, 1297 insertions, 1541 deletions
diff --git a/doc/book-enea-nfv-access-security-report b/doc/book-enea-nfv-access-security-report
index 8e498c3..3c8b3f1 100644
--- a/doc/book-enea-nfv-access-security-report
+++ b/doc/book-enea-nfv-access-security-report
@@ -1,1541 +1,1297 @@
1CVE name: CVE-2017-1000366 1CVE-2017-1000253
2Package: glibc 2Package: kernel
3Score: 7.2 (High) 3Score: 8.0 (High)
4Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. 4Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86
5Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 5Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253
6 6
7CVE name: CVE-2017-1000364 7CVE-2017-14496
8Package: Kernel 8Package: dnsmasq
9Score: 7.0 (High) 9Score: 7.0 (High)
10Description: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010). 10Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
11Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364 11Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496
12 12
13CVE name: CVE-2017-1000253 13CVE-2017-14495
14Package: kernel 14Package: dnsmasq
15Score: 8.0 (High) 15Score: 7.0 (High)
16Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 16Description: Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
17Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253 17Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495
18 18
19CVE name: CVE-2017-1000101 19CVE-2017-14494
20Package: curl 20Package: dnsmasq
21Score: 4.0 (Medium) 21Score: 7.0 (High)
22Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing. 22Description: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
23Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101 23Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494
24 24
25CVE name: CVE-2017-1000100 25CVE-2017-14493
26Package: curl 26Package: dnsmasq
27Score: 4.0 (Medium) 27Score: 9.0 (High)
28Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer. 28Description: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
29Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 29Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493
30 30
31CVE name: CVE-2017-1000082 31CVE-2017-14492
32Package: systemd 32Package: dnsmasq
33Score: 10.0 (High) 33Score: 9.0 (High)
34Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended. 34Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
35Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082 35Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492
36 36
37CVE name: CVE-2017-14496 37CVE-2017-14491
38Package: dnsmasq 38Package: dnsmasq
39Score: 7.0 (High) 39Score: 9.0 (High)
40Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request. 40Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
41Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 41Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491
42 42
43CVE name: CVE-2017-14495 43CVE-2017-12132
44Package: dnsmasq 44Package: glibc
45Score: 7.0 (High) 45Score: 4.3 (Medium)
46Description: Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. 46Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
47Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495 47Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
48 48
49CVE name: CVE-2017-14494 49CVE-2017-11176
50Package: dnsmasq 50Package: kernel
51Score: 7.0 (High) 51Score: 10.0 (High)
52Description: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests. 52Description: The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
53Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494 53Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
54 54
55CVE name: CVE-2017-14493 55CVE-2017-1000366
56Package: dnsmasq 56Package: glibc
57Score: 9.0 (High) 57Score: 7.2 (High)
58Description: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. 58Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE.
59Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493 59Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
60 60
61CVE name: CVE-2017-14492 61CVE-2017-1000364
62Package: dnsmasq 62Package: Kernel
63Score: 9.0 (High) 63Score: 7.0 (High)
64Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request. 64Description: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
65Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492 65Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
66 66
67CVE name: CVE-2017-14491 67CVE-2017-1000257
68Package: dnsmasq 68Package: curl
69Score: 9.0 (High) 69Score: 6.4 (Medium)
70Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. 70Description: An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
71Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491 71Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
72 72
73CVE name: CVE-2017-12132 73CVE-2017-1000101
74Package: glibc 74Package: curl
75Score: 4.3 (Medium) 75Score: 4.0 (Medium)
76Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation. 76Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing.
77Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132 77Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
78 78
79CVE name: CVE-2017-9445 79CVE-2017-1000100
80Package: systemd 80Package: curl
81Score: 5.0 (Medium) 81Score: 4.0 (Medium)
82Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. 82Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer.
83Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445 83Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
84 84
85CVE name: CVE-2017-9216 85CVE-2017-1000082
86Package: ghostscript 86Package: systemd
87Score: 4.3 (Medium) 87Score: 10.0 (High)
88Description: libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file. 88Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
89Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216 89Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082
90 90
91CVE name: CVE-2017-9050 91CVE-2017-9445
92Package: libxml2-native 92Package: systemd
93Score: 5.0 (Medium) 93Score: 5.0 (Medium)
94Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. 94Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
95Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 95Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445
96 96
97CVE name: CVE-2017-9049 97CVE-2017-9050
98Package: libxml2-native 98Package: libxml2-native
99Score: 5.0 (Medium) 99Score: 5.0 (Medium)
100Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398. 100Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
101Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 101Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
102 102
103CVE name: CVE-2017-9048 103CVE-2017-9049
104Package: libxml2-native 104Package: libxml2-native
105Score: 5.0 (Medium) 105Score: 5.0 (Medium)
106Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. 106Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
107Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 107Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
108 108
109CVE name: CVE-2017-9047 109CVE-2017-9048
110Package: libxml2-native 110Package: libxml2-native
111Score: 5.0 (Medium) 111Score: 5.0 (Medium)
112Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash. 112Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
113Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 113Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
114 114
115CVE name: CVE-2017-8872 115CVE-2017-9047
116Package: libxml2-native 116Package: libxml2-native
117Score: 6.4 (Medium) 117Score: 5.0 (Medium)
118Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. 118Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
119Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 119Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
120 120
121CVE name: CVE-2017-8831 121CVE-2017-8872
122Package: kernel 122Package: libxml2-native
123Score: 7.2 (High) 123Score: 6.4 (Medium)
124Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. 124Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
125Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831 125Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
126 126
127CVE name: CVE-2017-8804 127CVE-2017-8831
128Package: glibc 128Package: kernel
129Score: 7.8 (High) 129Score: 7.2 (High)
130Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. 130Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
131Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804 131Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831
132 132
133CVE name: CVE-2017-8779 133CVE-2017-8817
134Package: rpcbind 134Package: curl
135Score: 7.8 (High) 135Score: 5.0 (Medium)
136Description: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb 136Description: libcurl contains a read out of bounds flaw in the FTP wildcard function.libcurl's FTP wildcard matching feature, which is enabled with the CURLOPT_WILDCARDMATCH option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket ([) but instead it will continue reading the heap beyond the end of the URL buffer that holds the wildcard.For applications that use HTTP(S) URLs, allow libcurl to handle redirects and have FTP wildcards enabled, this flaw can be triggered by malicious servers that can redirect clients to a URL using such a wildcard pattern.We are not aware of any exploit of this flaw.
137Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779 137Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
138 138
139CVE name: CVE-2017-8392 139CVE-2017-8816
140Package: binutils 140Package: curl
141Score: 5.0 (Medium) 141Score: 5.0 (Medium)
142Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. 142Description: libcurl contains a buffer overrun flaw in the NTLM authentication code.The internal function Curl_ntlm_core_mk_ntlmv2_hash sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap.The SUvalue is subsequently used to iterate over the input and generate output into the storage buffer. On systems with a 32 bit size_t, the math to calculate SIZE triggers an integer overflow when the combined lengths of the user name and password is larger than 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a buffer overrun.We are not aware of any exploit of this flaw.
143Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392 143Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
144 144
145CVE name: CVE-2017-8309 145CVE-2017-8804
146Package: Qemu 146Package: glibc
147Score: 7.8 (High) 147Score: 7.8 (High)
148Description: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture. 148Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
149Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309 149Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804
150 150
151CVE name: CVE-2017-8105 151CVE-2017-8392
152Package: freetype 152Package: binutils
153Score: 7.5 (High) 153Score: 5.0 (Medium)
154Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. 154Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392
156 156
157CVE-2017-8072 157CVE-2017-8309
158Package: Kernel 158Package: Qemu
159Score: 7.2 (High) 159Score: 7.8 (High)
160Description: The cp2114_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux Kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. 160Description: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
161Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072 161Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309
162 162
163CVE-2017-8070 163CVE-2017-8105
164Package: Kernel 164Package: freetype
165Score: 7.2 (High) 165Score: 7.5 (High)
166Description: drivers/net/usb/catc.c in the Linux Kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 166Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
167Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070 167Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
168 168
169CVE name: CVE-2017-8069 169CVE-2017-8069
170Package: kernel 170Package: kernel
171Score: 7.2 (High) 171Score: 7.2 (High)
172Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 172Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
173Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 173Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069
174 174
175CVE name: CVE-2017-8068 175CVE-2017-8068
176Package: kernel 176Package: kernel
177Score: 7.2 (High) 177Score: 7.2 (High)
178Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 178Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
179Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068 179Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068
180 180
181CVE name: CVE-2017-8067 181CVE-2017-8067
182Package: kernel 182Package: kernel
183Score: 7.2 (High) 183Score: 7.2 (High)
184Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 184Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
185Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067 185Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067
186 186
187CVE name: CVE-2017-8066 187CVE-2017-8066
188Package: kernel 188Package: kernel
189Score: 7.2 (High) 189Score: 7.2 (High)
190Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 190Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
191Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066 191Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066
192 192
193CVE name: CVE-2017-8065 193CVE-2017-8064
194Package: kernel 194Package: kernel
195Score: 7.2 (High) 195Score: 7.2 (High)
196Description: rypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 196Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
197Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065 197Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064
198 198
199CVE name: CVE-2017-8064 199CVE-2017-8063
200Package: kernel 200Package: kernel
201Score: 7.2 (High) 201Score: 7.2 (High)
202Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 202Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
203Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064 203Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063
204 204
205CVE name: CVE-2017-8063 205CVE-2017-8062
206Package: kernel 206Package: kernel
207Score: 7.2 (High) 207Score: 7.2 (High)
208Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 208Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
209Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063 209Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062
210 210
211CVE name: CVE-2017-8062 211CVE-2017-7869
212Package: kernel 212Package: gnutls
213Score: 7.2 (High) 213Score: 5.0 (Medium)
214Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 214Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
215Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062 215Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
216 216
217CVE name: CVE-2017-7975 217CVE-2017-7645
218Package: Ghostscript 218Package: kernel
219Score: 6.8 (Medium) 219Score: 7.8 (High)
220Description: Artifex jbig2dec 0.13, as used in Ghostscript, allows out-of-bounds writes because of an integer overflow in the jbig2_build_huffman_table function in jbig2_huffman.c during operations on a crafted JBIG2 file, leading to a denial of service (application crash) or possibly execution of arbitrary code. 220Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
221Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7975 221Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645
222 222
223CVE name: CVE-2017-7895 223CVE-2017-7618
224Package: kernel 224Package: kernel
225Score: 10.0 (High) 225Score: 7.8 (High)
226Description: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. 226Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
227Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895 227Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618
228 228
229CVE name: CVE-2017-7869 229CVE-2017-7487
230Package: gnutls 230Package: kernel
231Score: 5.0 (Medium) 231Score: 7.2 (High)
232Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. 232Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
233Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 233Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487
234 234
235CVE name: CVE-2017-7645 235CVE-2017-7471
236Package: kernel 236Package: Qemu
237Score: 7.8 (High) 237Score: 0.0 (Low)
238Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. 238Description: Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory.A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
239Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645 239Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471
240 240
241CVE name: CVE-2017-7618 241CVE-2017-7468
242Package: kernel 242Package: curl
243Score: 7.8 (High) 243Score: 6.0 (Medium)
244Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. 244Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate).
245Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618 245Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468
246 246
247CVE name: CVE-2017-7487 247CVE-2017-7407
248Package: kernel 248Package: curl
249Score: 7.2 (High) 249Score: 2.1 (Low)
250Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. 250Description: The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
251Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487 251Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
252 252
253CVE name: CVE-2017-7471 253CVE-2017-7304
254Package: Qemu 254Package: binutils
255Score: 0.0 (Low) 255Score: 5.0 (Medium)
256Description: Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory.A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. 256Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.
257Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471 257Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304
258 258
259CVE name: CVE-2017-7468 259CVE-2017-7210
260Package: curl 260Package: binutils
261Score: 6.0 (Medium) 261Score: 7.8 (High)
262Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). 262Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
263Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468 263Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
264 264
265CVE name: CVE-2017-7304 265CVE-2017-7209
266Package: Binutils 266Package: binutils
267Score: 5.0 (Medium) 267Score: 4.3 (Medium)
268Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash. 268Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.
269Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304 269Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
270 270
271CVE name: CVE-2017-7210 271CVE-2017-6969
272Package: binutils 272Package: binutils
273Score: 7.8 (High) 273Score: 6.4 (Medium)
274Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash. 274Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
275Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 275Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
276 276
277CVE name: CVE-2017-7209 277CVE-2017-6966
278Package: binutils 278Package: binutil
279Score: 4.3 (Medium) 279Score: 4.0 (Medium)
280Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash. 280Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
281Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209 281Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
282 282
283CVE name: CVE-2017-7207 283CVE-2017-6965
284Package: ghostscript 284Package: binutils
285Score: 4.3 (Medium) 285Score: 4.3 (Medium)
286Description: The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document. 286Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
287Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207 287Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
288 288
289CVE name: CVE-2017-6969 289CVE-2017-6505
290Package: binutils 290Package: Qemu
291Score: 6.4 (Medium) 291Score: 4.0 (Medium)
292Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well. 292Description: Quick Emulator built with the USB OHCI Emulation support is vulnerable to aninfinite loop issue. It could occur while processing an endpoint listdescriptor in ohci_service_ed_list().A guest user/process could use this flaw to crash Qemu process resulting in DoS.
293Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969 293Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505
294 294
295CVE name: CVE-2017-6966 295CVE-2017-6353
296Package: binutil 296Package: Kernel
297Score: 4.0 (Medium) 297Score: 5.0 (Medium)
298Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations. 298Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
299Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966 299Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353
300 300
301CVE name: CVE-2017-6965 301CVE-2017-6348
302Package: binutils 302Package: Kernel
303Score: 4.3 (Medium) 303Score: 5.0 (Medium)
304Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow. 304Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
305Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965 305Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348
306 306
307CVE name: CVE-2017-6874 307CVE-2017-6345
308Package: Kernel 308Package: Kernel
309Score: 7.0 (High) 309Score: 5.0 (Medium)
310Description: Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts. 310Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
311Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874 311Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345
312 312
313CVE name: CVE-2017-6505 313CVE-2017-6214
314Package: Qemu 314Package: Kernel
315Score: 4.0 (Medium) 315Score: 5.0 (Medium)
316Description: Quick Emulator built with the USB OHCI Emulation support is vulnerable to aninfinite loop issue. It could occur while processing an endpoint listdescriptor in ohci_service_ed_list().A guest user/process could use this flaw to crash Qemu process resulting in DoS. 316Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
317Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505 317Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214
318 318
319CVE name: CVE-2017-6353 319CVE-2017-6058
320Package: Kernel 320Package: Qemu
321Score: 5.0 (Medium) 321Score: 5.0 (Medium)
322Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. 322Description: Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
323Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353 323Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058
324 324
325CVE name: CVE-2017-6348 325CVE-2017-5986
326Package: Kernel 326Package: Kernel
327Score: 5.0 (Medium) 327Score: 7.0 (High)
328Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices. 328Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
329Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348 329Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986
330 330
331CVE name: CVE-2017-6347 331CVE-2017-5970
332Package: Kernel 332Package: Kernel
333Score: 7.0 (High) 333Score: 5.0 (Medium)
334Description: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission. 334Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
335Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347 335Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970
336 336
337CVE name: CVE-2017-6346 337CVE-2017-5969
338Package: Kernel 338Package: libxml2-native
339Score: 7.0 (High) 339Score: 2.6 (Low)
340Description: Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls. 340Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
341Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346 341Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969
342 342
343CVE name: CVE-2017-6345 343CVE-2017-5931
344Package: Kernel 344Package: Qemu
345Score: 5.0 (Medium) 345Score: 6.0 (Medium)
346Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls. 346Description: Quick Emulator(Qemu) built with the Virtio crypto device emulation support isvulnerable to an integer overflow issue. It could occur while handling dataencryption/decryption requests in 'virtio_crypto_handle_sym_req'.A privileged user inside guest could use this flaw to crash the Qemu processresulting in DoS or potentially execute arbitrary code on the host withprivileges of the Qemu process.
347Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345 347Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931
348 348
349CVE name: CVE-2017-6214 349CVE-2017-5848
350Package: Kernel 350Package: gstreamer
351Score: 5.0 (Medium) 351Score: 5.0 (Medium)
352Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. 352Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
353Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214 353Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
354 354
355CVE name: CVE-2017-6074 355CVE-2017-5847
356Package: Kernel 356Package: gstreamer
357Score: 8.0 (High) 357Score: 5.0 (Medium)
358Description: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. 358Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors.
359Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074 359Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847
360 360
361CVE name: CVE-2017-6058 361CVE-2017-5669
362Package: Qemu 362Package: Kernel
363Score: 5.0 (Medium) 363Score: 5.0 (Medium)
364Description: Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping. 364Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
365Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058 365Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669
366 366
367CVE name: CVE-2017-6001 367CVE-2017-5618
368Package: Kernel 368Package: GNU screen
369Score: 8.0 (High) 369Score: 7.2 (High)
370Description: Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786. 370Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
371Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001 371Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618
372 372
373CVE name: CVE-2017-5986 373CVE-2017-5577
374Package: Kernel 374Package: Kernel
375Score: 7.0 (High) 375Score: 5.0 (Medium)
376Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state. 376Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
377Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986 377Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577
378 378
379CVE name: CVE-2017-5970 379CVE-2017-5551
380Package: Kernel 380Package: Kernel
381Score: 5.0 (Medium) 381Score: 4.0 (Medium)
382Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options. 382Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
383Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970 383Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551
384 384
385CVE name: CVE-2017-5969 385CVE-2017-5335
386Package: libxml2-native 386Package: GnuTLS
387Score: 2.6 (Low) 387Score: 5.0 (Medium)
388Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser." 388Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
389Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969 389Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
390 390
391CVE name: CVE-2017-5931 391CVE-2017-3737
392Package: Qemu 392Package: OpenSSL
393Score: 6.0 (Medium) 393Score: 6.0 (Medium)
394Description: Quick Emulator(Qemu) built with the Virtio crypto device emulation support isvulnerable to an integer overflow issue. It could occur while handling dataencryption/decryption requests in 'virtio_crypto_handle_sym_req'.A privileged user inside guest could use this flaw to crash the Qemu processresulting in DoS or potentially execute arbitrary code on the host withprivileges of the Qemu process. 394Description: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"mechanism. The intent was that if a fatal error occurred during a handshake thenOpenSSL would move into the error state and would immediately fail if youattempted to continue the handshake. This works as designed for the explicithandshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),however due to a bug it does not work correctly if SSL_read() or SSL_write() iscalled directly. In that scenario, if the handshake fails then a fatal errorwill be returned in the initial function call. If SSL_read()/SSL_write() issubsequently called by the application for the same SSL object then it willsucceed and the data is passed without being decrypted/encrypted directly fromthe SSL/TLS record layer.In order to exploit this issue an application bug would have to be present thatresulted in a call to SSL_read()/SSL_write() being issued after having alreadyreceived a fatal error.External References:https://www.openssl.org/news/secadv/20171207.txt
395Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931 395Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737
396 396
397CVE name: CVE-2017-5848 397CVE-2017-3735
398Package: gstreamer 398Package: OpenSSL
399Score: 5.0 (Medium) 399Score: 5.0 (Medium)
400Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing. 400Description: While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
401Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848 401Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
402 402
403CVE name: CVE-2017-5847 403CVE-2017-3731
404Package: gstreamer 404Package: OpenSSL
405Score: 5.0 (Medium) 405Score: 5.0 (Medium)
406Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors. 406Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
407Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847 407Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
408 408
409CVE name: CVE-2017-5669 409CVE-2017-3136
410Package: Kernel 410Package: bind
411Score: 5.0 (Medium) 411Score: 5.9 (Medium)
412Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context. 412Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met.
413Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669 413Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
414 414
415CVE name: CVE-2017-5618 415CVE-2017-3135
416Package: GNU screen 416Package: bind
417Score: 7.2 (High) 417Score: 6.0 (Medium)
418Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions. 418Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer.
419Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618 419Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
420 420
421CVE name: CVE-2017-5601 421CVE-2017-2628
422Package: ibarchive 422Package: curl
423Score: 5.0 (Medium) 423Score: 0.0 (Low)
424Description: An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive. 424Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server.
425Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601 425Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628
426 426
427CVE name: CVE-2017-5577 427CVE-2017-2620
428Package: Kernel 428Package: Qemu
429Score: 5.0 (Medium) 429Score: 9.0 (High)
430Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call. 430Description: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.Upstream patch: http://git.qemu-project.org/?p=qemu.git;a=commit;h=92f2b88cea48c6aeba8de568a45f2ed958f3c298
431Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577 431Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620
432 432
433CVE name: CVE-2017-5576 433
434Package: Kernel 434CVE-2016-9923
435Score: 7.0 (High) 435Package: Qemu
436Description: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call. 436Score: 2.0 (Low)
437Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576 437Description: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.
438 438Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923
439CVE name: CVE-2017-5551 439
440Package: Kernel 440CVE-2016-9921
441Score: 4.0 (Medium) 441Package: Qemu
442Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. 442Score: 2.0 (Low)
443Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551 443Description: Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
444 444Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921
445CVE name: CVE-2017-5548 445
446Package: Kernel 446CVE-2016-9916
447Score: 7.0 (High) 447Package: Qemu
448Description: drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 448Score: 5.0 (Medium)
449Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548 449Description: Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend.
450 450Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916
451CVE name: CVE-2017-5547 451
452Package: Kernel 452CVE-2016-9915
453Score: 7.0 (High) 453Package: Qemu
454Description: drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 454Score: 5.0 (Medium)
455Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5547 455Description: Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend.
456 456Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915
457CVE name: CVE-2017-5546 457
458Package: Kernel 458CVE-2016-9914
459Score: 7.0 (High) 459Package: Qemu
460Description: The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number. 460Score: 5.0 (Medium)
461Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5546 461Description: Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations.
462 462Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914
463CVE name: CVE-2017-5335 463
464Package: GnuTLS 464CVE-2016-9913
465Score: 5.0 (Medium) 465Package: Qemu
466Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. 466Score: 5.0 (Medium)
467Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 467Description: Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
468 468Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913
469CVE name: CVE-2017-5225 469
470Package: tiff 470CVE-2016-9912
471Score: 7.5 (High) 471Package: Qemu
472Description: LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value. 472Score: 2.0 (Low)
473Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225 473Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
474 474Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912
475CVE name: CVE-2017-5029 475
476Package: libxslt 476CVE-2016-9911
477Score: 6.8 (Medium) 477Package: Qemu
478Description: The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. 478Score: 2.0 (Low)
479Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029 479Description: Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
480 480Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911
481CVE name: CVE-2017-3731 481
482Package: OpenSSL 482CVE-2016-9908
483Score: 5.0 (Medium) 483Package: Qemu
484Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. 484Score: 2.0 (Low)
485Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 485Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
486 486Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908
487CVE name: CVE-2017-3136 487
488Package: bind 488CVE-2016-9907
489Score: 5.9 (Medium) 489Package: Qemu
490Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. 490Score: 2.0 (Low)
491Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136 491Description: Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
492 492Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907
493CVE name: CVE-2017-3135 493
494Package: bind 494CVE-2016-9846
495Score: 6.0 (Medium) 495Package: Qemu
496Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. 496Score: 5.0 (Medium)
497Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 497Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
498 498Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846
499CVE name: CVE-2017-2636 499
500Package: Kernel 500CVE-2016-9845
501Score: 7.2 (High) 501Package: Qemu
502Description: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. 502Score: 0.0 (Low)
503Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636 503Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
504 504Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845
505CVE name: CVE-2017-2628 505
506Package: curl 506CVE-2016-9776
507Score: 0.0 (Low) 507Package: Qemu
508Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. 508Score: 2.0 (Low)
509Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628 509Description: QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
510 510Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776
511CVE name: CVE-2017-2620 511
512Package: Qemu 512CVE-2016-9754
513Score: 9.0 (High) 513Package: Kernel
514Description: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.Upstream patch: http://git.qemu-project.org/?p=qemu.git;a=commit;h=92f2b88cea48c6aeba8de568a45f2ed958f3c298 514Score: 7.0 (High)
515Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620 515Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file.
516 516Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754
517CVE name: CVE-2016-10350 517
518Package: libarchive 518CVE-2016-9603
519Score: 4.3 (Medium) 519Package: Qemu
520Description: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. 520Score: 8.0 (High)
521Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350 521Description: A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
522 522Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603
523CVE name: CVE-2016-10349 523
524Package: libarchive 524CVE-2016-9444
525Score: 4.2 (Medium) 525Package: bind
526Description: The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. 526Score: 7.0 (High)
527Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349 527Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
528 528Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
529CVE name: CVE-2016-10229 529
530Package: kernel 530CVE-2016-9401
531Score: 10.0 (High) 531Package: bash
532Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag. 532Score: 2.0 (Low)
533Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229 533Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6
534 534Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401
535CVE name: CVE-2016-10208 535
536Package: Kernel 536CVE-2016-9318
537Score: 5.0 (Medium) 537Package: libxml2-native
538Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image. 538Score: 6.8 (Medium)
539Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208 539Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
540 540Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
541CVE name: CVE-2016-10200 541
542Package: Kernel 542CVE-2016-9106
543Score: 7.0 (High) 543Package: Qemu
544Description: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. 544Score: 2.0 (Low)
545Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200 545Description: Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
546 546Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106
547CVE name: CVE-2016-10154 547
548Package: Kernel 548CVE-2016-9105
549Score: 5.0 (Medium) 549Package: Qemu
550Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist. 550Score: 2.0 (Low)
551Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154 551Description: Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
552 552Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105
553CVE name: CVE-2016-10153 553
554Package: Kernel 554CVE-2016-9104
555Score: 7.0 (High) 555Package: Qemu
556Description: The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code. 556Score: 2.0 (Low)
557Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153 557Description: Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
558 558Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104
559CVE name: CVE-2016-10150 559
560Package: KVM 560CVE-2016-9103
561Score: 10.0 (High) 561Package: Qemu
562Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device. 562Score: 2.0 (Low)
563Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150 563Description: The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
564 564Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103
565CVE name: CVE-2016-10147 565
566Package: Kernel 566CVE-2016-9102
567Score: 5.0 (Medium) 567Package: Qemu
568Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). 568Score: 2.0 (Low)
569Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147 569Description: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
570 570Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102
571CVE name: CVE-2016-10124 571
572Package: LXC 572CVE-2016-9083
573Score: 5.0 (Medium) 573Package: Kernel
574Description: An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container. 574Score: 8.0 (High)
575Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124 575Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
576 576Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
577CVE name: CVE-2016-10087 577
578Package: Libpng 578CVE-2016-8910
579Score: 5.0 (Medium) 579Package: Qemu
580Description: The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. 580Score: 2.0 (Low)
581Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087 581Description: The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
582 582Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910
583CVE name: CVE-2016-10044 583
584Package: Kernel 584CVE-2016-8909
585Score: 7.0 (High) 585Package: Qemu
586Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. 586Score: 2.0 (Low)
587Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044 587Description: The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
588 588Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909
589CVE name: CVE-2016-10029 589
590Package: Qemu 590CVE-2016-8864
591Score: 2.0 (Low) 591Package: bind
592Description: The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts. 592Score: 5.0 (Medium)
593Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029 593Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
594 594Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
595CVE name: CVE-2016-9923 595
596Package: Qemu 596CVE-2016-8858
597Score: 2.0 (Low) 597Package: OpenSSL
598Description: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS. 598Score: 7.8 (High)
599Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923 599Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server’s memory.
600 600Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858
601CVE name: CVE-2016-9921 601
602Package: Qemu 602CVE-2016-8669
603Score: 2.0 (Low) 603Package: Qemu
604Description: Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS. 604Score: 2.0 (Low)
605Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921 605Description: The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
606 606Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669
607CVE name: CVE-2016-9916 607
608Package: Qemu 608CVE-2016-8668
609Score: 5.0 (Medium) 609Package: Qemu
610Description: Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend. 610Score: 2.0 (Low)
611Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916 611Description: The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.
612 612Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668
613CVE name: CVE-2016-9915 613
614Package: Qemu 614CVE-2016-8655
615Score: 5.0 (Medium) 615Package: Kernel
616Description: Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend. 616Score: 8.0 (High)
617Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915 617Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
618 618Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
619CVE name: CVE-2016-9914 619
620Package: Qemu 620CVE-2016-8649
621Score: 5.0 (Medium) 621Package: lxc
622Description: Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations. 622Score: 9.0 (High)
623Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914 623Description: lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
624 624Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649
625CVE name: CVE-2016-9913 625
626Package: Qemu 626CVE-2016-8625
627Score: 5.0 (Medium) 627Package: curl
628Description: Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup. 628Score: 6.9 (Medium)
629Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913 629Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German ßcharacter (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `straße.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn.
630 630Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
631CVE name: CVE-2016-9912 631
632Package: Qemu 632CVE-2016-8624
633Score: 2.0 (Low) 633Package: curl
634Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. 634Score: 6.9 (Medium)
635Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912 635Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes.
636 636Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
637CVE name: CVE-2016-9911 637
638Package: Qemu 638CVE-2016-8623
639Score: 2.0 (Low) 639Package: curl
640Description: Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. 640Score: 4.9 (Medium)
641Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911 641Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls.
642 642Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
643CVE name: CVE-2016-9908 643
644Package: Qemu 644CVE-2016-8622
645Score: 2.0 (Low) 645Package: curl
646Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes. 646Score: 4.9 (Medium)
647Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908 647Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program.
648 648Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
649CVE name: CVE-2016-9907 649
650Package: Qemu 650CVE-2016-8621
651Score: 2.0 (Low) 651Package: curl
652Description: Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. 652Score: 4.9 (Medium)
653Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907 653Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds.
654 654Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
655CVE name: CVE-2016-9846 655
656Package: Qemu 656CVE-2016-8620
657Score: 5.0 (Medium) 657Package: curl
658Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. 658Score: 6.9 (Medium)
659Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846 659Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer.
660 660Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
661CVE name: CVE-2016-9845 661
662Package: Qemu 662CVE-2016-8619
663Score: 0.0 (Low) 663Package: curl
664Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes. 664Score: 6.9 (Medium)
665Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845 665Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver.
666 666Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
667CVE name: CVE-2016-9844 667
668Package: unzip 668CVE-2016-8618
669Score: 2.1 (Low) 669Package: curl
670Description: Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header. 670Score: 6.9 (Medium)
671Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844 671Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function.
672 672Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
673CVE name: CVE-2016-9776 673
674Package: Qemu 674CVE-2016-8617
675Score: 2.0 (Low) 675Package: curl
676Description: QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS. 676Score: 6.9 (Medium)
677Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776 677Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.
678 678Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
679CVE name: CVE-2016-9754 679
680Package: Kernel 680CVE-2016-8616
681Score: 7.0 (High) 681Package: curl
682Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file. 682Score: 3.9 (Low)
683Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754 683Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw.
684 684Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
685CVE name: CVE-2016-9603 685
686Package: Qemu 686CVE-2016-8615
687Score: 8.0 (High) 687Package: curl
688Description: A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. 688Score: 6.9 (Medium)
689Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603 689Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw.
690 690Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
691CVE name: CVE-2016-9540 691
692Package: tiff 692CVE-2016-8578
693Score: 7.5 (High) 693Package: Qemu
694Description: tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled images with odd tile width versus image width. Reported as MSVR 35103, aka "cpStripToTile heap-buffer-overflow." 694Score: 2.0 (Low)
695Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540 695Description: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
696 696Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578
697CVE name: CVE-2016-9539 697
698Package: tiff 698CVE-2016-8577
699Score: 7.5 (High) 699Package: Qemu
700Description: tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds read in readContigTilesIntoBuffer(). Reported as MSVR 35092. 700Score: 2.0 (Low)
701Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539 701Description: Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
702 702Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577
703CVE name: CVE-2016-9538 703
704Package: tiff 704CVE-2016-8576
705Score: 7.5 (High) 705Package: Qemu
706Description: tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100. 706Score: 2.0 (Low)
707Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538 707Description: The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
708 708Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576
709CVE name: CVE-2016-9537 709
710Package: tiff 710CVE-2016-7995
711Score: 7.5 (High) 711Package: Qemu
712Description: tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097. 712Score: 2.0 (Low)
713Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537 713Description: Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
714 714Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995
715CVE name: CVE-2016-9536 715
716Package: tiff 716CVE-2016-7994
717Score: 7.5 (High) 717Package: Qemu
718Description: tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka "t2p_process_jpeg_strip heap-buffer-overflow." 718Score: 2.0 (Low)
719Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536 719Description: Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.
720 720Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994
721CVE name: CVE-2016-9535 721
722Package: tiff 722CVE-2016-7909
723Score: 7.5 (High) 723Package: Qemu
724Description: tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow." 724Score: 5.0 (Medium)
725Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535 725Description: The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
726 726Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909
727CVE name: CVE-2016-9534 727
728Package: tiff 728CVE-2016-7908
729Score: 7.5 (High) 729Package: Qemu
730Description: tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka "TIFFFlushData1 heap-buffer-overflow." 730Score: 2.0 (Low)
731Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534 731Description: The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
732 732Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908
733CVE name: CVE-2016-9533 733
734Package: tiff 734CVE-2016-7795
735Score: 7.5 (High) 735Package: systemd
736Description: tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094, aka "PixarLog horizontalDifference heap-buffer-overflow." 736Score: 4.9 (Medium)
737Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533 737Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
738 738Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795
739CVE name: CVE-2016-9448 739
740Package: tiff 740CVE-2016-7466
741Score: 5.0 (Medium) 741Package: Qemu
742Description: The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297. 742Score: 2.0 (Low)
743Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448 743Description: Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
744 744Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466
745CVE name: CVE-2016-9444 745
746Package: bind 746CVE-2016-7423
747Score: 7.0 (High) 747Package: Qemu
748Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer. 748Score: 2.0 (Low)
749Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444 749Description: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.
750 750Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423
751CVE name: CVE-2016-9401 751
752Package: bash 752CVE-2016-7422
753Score: 2.0 (Low) 753Package: Qemu
754Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6 754Score: 2.0 (Low)
755Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401 755Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
756 756Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422
757CVE name: CVE-2016-9318 757
758Package: libxml2-native 758CVE-2016-7421
759Score: 6.8 (Medium) 759Package: Qemu
760Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. 760Score: 2.0 (Low)
761Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 761Description: The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.
762 762Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421
763CVE name: CVE-2016-9297 763
764Package: tiff 764CVE-2016-7170
765Score: 5.0 (Medium) 765Package: Qemu
766Description: The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values. 766Score: 2.0 (Low)
767Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297 767Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
768 768Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170
769CVE name: CVE-2016-9273 769
770Package: tiff 770CVE-2016-7157
771Score: 4.3 (Medium) 771Package: Qemu
772Description: tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode. 772Score: 2.0 (Low)
773Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273 773Description: The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.
774 774Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157
775CVE name: CVE-2016-9106 775
776Package: Qemu 776CVE-2016-7156
777Score: 2.0 (Low) 777Package: Qemu
778Description: Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector. 778Score: 2.0 (Low)
779Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106 779Description: The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
780 780Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
781CVE name: CVE-2016-9105 781
782Package: Qemu 782CVE-2016-7155
783Score: 2.0 (Low) 783Package: Qemu
784Description: Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object. 784Score: 2.0 (Low)
785Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105 785Description: hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
786 786Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155
787CVE name: CVE-2016-9104 787
788Package: Qemu 788CVE-2016-7116
789Score: 2.0 (Low) 789Package: Qemu
790Description: Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access. 790Score: 2.0 (Low)
791Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104 791Description: Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
792 792Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
793CVE name: CVE-2016-9103 793
794Package: Qemu 794CVE-2016-7097
795Score: 2.0 (Low) 795Package: Kernel
796Description: The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them. 796Score: 3.6 (Low)
797Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103 797Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
798 798Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097
799CVE name: CVE-2016-9102 799
800Package: Qemu 800CVE-2016-6888
801Score: 2.0 (Low) 801Package: Qemu
802Description: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number. 802Score: 2.0 (Low)
803Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102 803Description: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
804 804Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
805CVE name: CVE-2016-9083 805
806Package: Kernel 806CVE-2016-6836
807Score: 8.0 (High) 807Package: Qemu
808Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug." 808Score: 2.0 (Low)
809Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083 809Description: The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
810 810Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
811CVE name: CVE-2016-8910 811
812Package: Qemu 812CVE-2016-6835
813Score: 2.0 (Low) 813Package: Qemu
814Description: The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count. 814Score: 2.0 (Low)
815Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910 815Description: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
816 816Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835
817CVE name: CVE-2016-8909 817
818Package: Qemu 818CVE-2016-6834
819Score: 2.0 (Low) 819Package: Qemu
820Description: The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position. 820Score: 2.0 (Low)
821Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909 821Description: The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
822 822Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834
823CVE name: CVE-2016-8864 823
824Package: bind 824CVE-2016-6833
825Score: 5.0 (Medium) 825Package: Qemu
826Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c. 826Score: 2.0 (Low)
827Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864 827Description: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
828 828Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
829CVE name: CVE-2016-8858 829
830Package: openssh 830CVE-2016-6490
831Score: 7.8 (High) 831Package: Qemu
832Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server�s memory. 832Score: 2.0 (Low)
833Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858 833Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
834 834Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
835CVE name: CVE-2016-8669 835
836Package: Qemu 836CVE-2016-6489
837Score: 2.0 (Low) 837Package: nettle
838Description: The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. 838Score: 5.0 (Medium)
839Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669 839Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
840 840Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489
841CVE name: CVE-2016-8668 841
842Package: Qemu 842CVE-2016-6480
843Score: 2.0 (Low) 843Package: Kernel
844Description: The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size. 844Score: 4.7 (Medium)
845Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668 845Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
846 846Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480
847CVE name: CVE-2016-8655 847
848Package: Kernel 848CVE-2016-6354
849Score: 8.0 (High) 849Package: flex
850Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. 850Score: 7.5 (High)
851Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655 851Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
852 852Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354
853CVE name: CVE-2016-8649 853
854Package: lxc 854CVE-2016-6351
855Score: 9.0 (High) 855Package: Qemu
856Description: lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls. 856Score: 7.0 (High)
857Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649 857Description: The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
858 858Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351
859CVE name: CVE-2016-8636 859
860Package: Kernel 860CVE-2016-6323
861Score: 7.0 (High) 861Package: glibc
862Description: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology. 862Score: 5.0 (Medium)
863Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636 863Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
864 864Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
865CVE name: CVE-2016-8630 865
866Package: Kernel 866CVE-2016-6321
867Score: 6.0 (Medium) 867Package: Tar (Gnu)
868Description: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction. 868Score: 5.0 (Medium)
869Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630 869Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
870 870Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
871CVE name: CVE-2016-8625 871
872Package: curl 872CVE-2016-6318
873Score: 6.9 (Medium) 873Package: cracklib
874Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German �character (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `stra�e.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn. 874Score: 7.5 (High)
875Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625 875Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
876 876Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
877CVE name: CVE-2016-8624 877
878Package: curl 878CVE-2016-6301
879Score: 6.9 (Medium) 879Package: busybox
880Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes. 880Score: 7.1 (High)
881Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 881Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
882 882Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301
883CVE name: CVE-2016-8623 883
884Package: curl 884CVE-2016-6252
885Score: 4.9 (Medium) 885Package: shadow
886Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls. 886Score: 5.0 (Medium)
887Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 887Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff
888 888Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252
889CVE name: CVE-2016-8622 889
890Package: curl 890CVE-2016-6185
891Score: 4.9 (Medium) 891Package: Perl
892Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program. 892Score: 5.0 (Medium)
893Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 893Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
894 894Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
895CVE name: CVE-2016-8621 895
896Package: curl 896CVE-2016-6170
897Score: 4.9 (Medium) 897Package: bind
898Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds. 898Score: 6.0 (Medium)
899Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 899Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390
900 900Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170
901CVE name: CVE-2016-8620 901
902Package: curl 902CVE-2016-6131
903Score: 6.9 (Medium) 903Package: gcc
904Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer. 904Score: 4.9 (Medium)
905Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620 905Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling.
906 906Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
907CVE name: CVE-2016-8619 907
908Package: curl 908CVE-2016-5636
909Score: 6.9 (Medium) 909Package: CPython
910Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver. 910Score: 10.0 (High)
911Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 911Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
912 912Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
913CVE name: CVE-2016-8618 913
914Package: curl 914CVE-2016-5403
915Score: 6.9 (Medium) 915Package: Qemu
916Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function. 916Score: 5.0 (Medium)
917Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 917Description: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
918 918Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403
919CVE name: CVE-2016-8617 919
920Package: curl 920CVE-2016-5338
921Score: 6.9 (Medium) 921Package: Qemu
922Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue. 922Score: 5.0 (Medium)
923Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 923Description: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
924 924Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338
925CVE name: CVE-2016-8616 925
926Package: curl 926CVE-2016-5337
927Score: 3.9 (Low) 927Package: Qemu
928Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw. 928Score: 2.0 (Low)
929Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 929Description: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
930 930Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337
931CVE name: CVE-2016-8615 931
932Package: curl 932CVE-2016-5300
933Score: 6.9 (Medium) 933Package: expat
934Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw. 934Score: 7.8 (High)
935Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 935Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
936 936Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
937CVE name: CVE-2016-8602 937
938Package: Ghostscript 938CVE-2016-5238
939Score: 6.8 (Medium) 939Package: Qemu
940Description: The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack. 940Score: 2.0 (Low)
941Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602 941Description: The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
942 942Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238
943CVE name: CVE-2016-8578 943
944Package: Qemu 944CVE-2016-5131
945Score: 2.0 (Low) 945Package: libxml2
946Description: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation. 946Score: 10.0 (High)
947Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578 947Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
948 948Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
949CVE name: CVE-2016-8577 949
950Package: Qemu 950CVE-2016-5126
951Score: 2.0 (Low) 951Package: Qemu
952Description: Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. 952Score: 5.0 (Medium)
953Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577 953Description: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
954 954Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126
955CVE name: CVE-2016-8576 955
956Package: Qemu 956CVE-2016-5107
957Score: 2.0 (Low) 957Package: Qemu
958Description: The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process. 958Score: 2.0 (Low)
959Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576 959Description: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
960 960Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107
961CVE name: CVE-2016-7995 961
962Package: Qemu 962CVE-2016-5106
963Score: 2.0 (Low) 963Package: Qemu
964Description: Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. 964Score: 2.0 (Low)
965Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995 965Description: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
966 966Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106
967CVE name: CVE-2016-7994 967
968Package: Qemu 968CVE-2016-5105
969Score: 2.0 (Low) 969Package: Qemu
970Description: Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands. 970Score: 2.0 (Low)
971Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994 971Description: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
972 972Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105
973CVE name: CVE-2016-7979 973
974Package: ghostscript 974CVE-2016-5008
975Score: 7.5 (High) 975Package: libvirt
976Description: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser. 976Score: 4.3 (Medium)
977Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979 977Description: libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
978 978Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008
979CVE name: CVE-2016-7978 979
980Package: ghostscript 980CVE-2016-4964
981Score: 7.5 (High) 981Package: Qemu
982Description: Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice. 982Score: 5.0 (Medium)
983Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978 983Description: The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s->state.
984 984Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964
985CVE name: CVE-2016-7977 985
986Package: ghostscript 986CVE-2016-4952
987Score: 4.3 (Medium) 987Package: Qemu
988Description: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document. 988Score: 2.0 (Low)
989Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977 989Description: QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
990 990Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952
991CVE name: CVE-2016-7909 991
992Package: Qemu 992CVE-2016-4658
993Score: 5.0 (Medium) 993Package: libxml2
994Description: The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0. 994Score: 10.0 (High)
995Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909 995Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
996 996Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
997CVE name: CVE-2016-7908 997
998Package: Qemu 998CVE-2016-4454
999Score: 2.0 (Low) 999Package: Qemu
1000Description: The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags. 1000Score: 3.0 (Low)
1001Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908 1001Description: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
1002 1002Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454
1003CVE name: CVE-2016-7795 1003
1004Package: systemd 1004CVE-2016-4453
1005Score: 4.9 (Medium) 1005Package: Qemu
1006Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. 1006Score: 5.0 (Medium)
1007Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795 1007Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
1008 1008Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453
1009CVE name: CVE-2016-7466 1009
1010Package: Qemu 1010CVE-2016-4448
1011Score: 2.0 (Low) 1011Package: libxml2
1012Description: Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. 1012Score: 10.0 (High)
1013Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466 1013Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
1014 1014Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
1015CVE name: CVE-2016-7423 1015
1016Package: Qemu 1016CVE-2016-4441
1017Score: 2.0 (Low) 1017Package: Qemu
1018Description: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects. 1018Score: 2.0 (Low)
1019Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423 1019Description: The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
1020 1020Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441
1021CVE name: CVE-2016-7422 1021
1022Package: Qemu 1022CVE-2016-4439
1023Score: 2.0 (Low) 1023Package: Qemu
1024Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value. 1024Score: 5.0 (Medium)
1025Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422 1025Description: The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
1026 1026Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439
1027CVE name: CVE-2016-7421 1027
1028Package: Qemu 1028CVE-2016-4037
1029Score: 2.0 (Low) 1029Package: Qemu
1030Description: The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size. 1030Score: 5.0 (Medium)
1031Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421 1031Description: The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
1032 1032Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037
1033CVE name: CVE-2016-7170 1033
1034Package: Qemu 1034CVE-2016-4020
1035Score: 2.0 (Low) 1035Package: Qemu
1036Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. 1036Score: 2.0 (Low)
1037Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170 1037Description: The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
1038 1038Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020
1039CVE name: CVE-2016-7157 1039
1040Package: Qemu 1040CVE-2016-4002
1041Score: 2.0 (Low) 1041Package: Qemu
1042Description: The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK. 1042Score: 7.0 (High)
1043Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157 1043Description: Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
1044 1044Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002
1045CVE name: CVE-2016-7156 1045
1046Package: Qemu 1046CVE-2016-4001
1047Score: 2.0 (Low) 1047Package: Qemu
1048Description: The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast. 1048Score: 4.0 (Medium)
1049Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156 1049Description: Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
1050 1050Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001
1051CVE name: CVE-2016-7155 1051
1052Package: Qemu 1052CVE-2016-3712
1053Score: 2.0 (Low) 1053Package: Qemu
1054Description: hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings. 1054Score: 2.0 (Low)
1055Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155 1055Description: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
1056 1056Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712
1057CVE name: CVE-2016-7116 1057
1058Package: Qemu 1058CVE-2016-3710
1059Score: 2.0 (Low) 1059Package: Qemu
1060Description: Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string. 1060Score: 7.0 (High)
1061Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116 1061Description: The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.
1062 1062Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710
1063CVE name: CVE-2016-7097 1063
1064Package: Kernel 1064CVE-2016-2858
1065Score: 3.6 (Low) 1065Package: Qemu
1066Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. 1066Score: 2.0 (Low)
1067Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097 1067Description: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
1068 1068Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
1069CVE name: CVE-2016-6888 1069
1070Package: Qemu 1070CVE-2016-2857
1071Score: 2.0 (Low) 1071Package: Qemu
1072Description: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. 1072Score: 2.0 (Low)
1073Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888 1073Description: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
1074 1074Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857
1075CVE name: CVE-2016-6836 1075
1076Package: Qemu 1076CVE-2016-2775
1077Score: 2.0 (Low) 1077Package: bind
1078Description: The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object. 1078Score: 4.3 (Medium)
1079Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836 1079Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
1080 1080Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
1081CVE name: CVE-2016-6835 1081
1082Package: Qemu 1082CVE-2016-2391
1083Score: 2.0 (Low) 1083Package: Qemu
1084Description: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. 1084Score: 2.0 (Low)
1085Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835 1085Description: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
1086 1086Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391
1087CVE name: CVE-2016-6834 1087
1088Package: Qemu 1088CVE-2016-2381
1089Score: 2.0 (Low) 1089Package: Perl
1090Description: The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length. 1090Score: 5.0 (Medium)
1091Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834 1091Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
1092 1092Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
1093CVE name: CVE-2016-6833 1093
1094Package: Qemu 1094CVE-2016-2183
1095Score: 2.0 (Low) 1095Package: OpenSSL
1096Description: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active. 1096Score: 5.0 (Medium)
1097Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833 1097Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
1098 1098Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
1099CVE name: CVE-2016-6490 1099
1100Package: Qemu 1100CVE-2016-2147
1101Score: 2.0 (Low) 1101Package: busybox
1102Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. 1102Score: 5.0 (Medium)
1103Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490 1103Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
1104 1104Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147
1105CVE name: CVE-2016-6489 1105
1106Package: nettle 1106CVE-2016-1568
1107Score: 5.0 (Medium) 1107Package: Qemu
1108Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack. 1108Score: 9.0 (High)
1109Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489 1109Description: Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
1110 1110Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
1111CVE name: CVE-2016-6480 1111
1112Package: Kernel 1112CVE-2016-1238
1113Score: 4.7 (Medium) 1113Package: Qemu
1114Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability. 1114Score: 7.0 (High)
1115Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480 1115Description: (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
1116 1116Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
1117CVE name: CVE-2016-6354 1117
1118Package: flex 1118CVE-2016-10229
1119Score: 7.5 (High) 1119Package: kernel
1120Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. 1120Score: 10.0 (High)
1121Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 1121Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
1122 1122Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229
1123CVE name: CVE-2016-6351 1123
1124Package: Qemu 1124CVE-2016-10208
1125Score: 7.0 (High) 1125Package: Kernel
1126Description: The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer. 1126Score: 5.0 (Medium)
1127Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351 1127Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
1128 1128Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208
1129CVE name: CVE-2016-6323 1129
1130Package: glibc 1130CVE-2016-10154
1131Score: 5.0 (Medium) 1131Package: Kernel
1132Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation. 1132Score: 5.0 (Medium)
1133Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 1133Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist.
1134 1134Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154
1135CVE name: CVE-2016-6321 1135
1136Package: Tar (Gnu) 1136CVE-2016-10150
1137Score: 5.0 (Medium) 1137Package: KVM
1138Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. 1138Score: 10.0 (High)
1139Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 1139Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device.
1140 1140Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150
1141CVE name: CVE-2016-6318 1141
1142Package: cracklib 1142CVE-2016-10147
1143Score: 7.5 (High) 1143Package: Kernel
1144Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer. 1144Score: 5.0 (Medium)
1145Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 1145Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
1146 1146Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147
1147CVE name: CVE-2016-6301 1147
1148Package: busybox 1148CVE-2016-10124
1149Score: 7.1 (High) 1149Package: LXC
1150Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop. 1150Score: 5.0 (Medium)
1151Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301 1151Description: An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container.
1152 1152Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124
1153CVE name: CVE-2016-6252 1153
1154Package: shadow 1154CVE-2016-10087
1155Score: 5.0 (Medium) 1155Package: Libpng
1156Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff 1156Score: 5.0 (Medium)
1157Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 1157Description: The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
1158 1158Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
1159CVE name: CVE-2016-6185 1159
1160Package: Perl 1160CVE-2016-10044
1161Score: 5.0 (Medium) 1161Package: Kernel
1162Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. 1162Score: 7.0 (High)
1163Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 1163Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
1164 1164Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
1165CVE name: CVE-2016-6170 1165
1166Package: bind 1166CVE-2016-10029
1167Score: 6.0 (Medium) 1167Package: Qemu
1168Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390 1168Score: 2.0 (Low)
1169Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170 1169Description: The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.
1170 1170Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029
1171CVE name: CVE-2016-6131 1171
1172Package: gcc 1172CVE-2016-0800
1173Score: 4.9 (Medium) 1173Package: OpenSSL
1174Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling. 1174Score: 4.3 (Medium)
1175Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131 1175Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
1176 1176Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
1177CVE name: CVE-2016-5875 1177
1178Package: libtiff 1178CVE-2016-0718
1179Score: 8.0 (High) 1179Package: expat
1180Description: An exploitable heap based buffer overflow exists in the handling of compressed TIFF images in LibTIFF�s PixarLogDecode api. A crafted TIFF document can lead to a heap based buffer overflow resulting in remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality. 1180Score: 7.5 (High)
1181Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875 1181Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
1182 1182Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
1183CVE name: CVE-2016-5652 1183
1184Package: tiff 1184CVE-2016-0634
1185Score: 6.8 (Medium) 1185Package: bash
1186Description: An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means. 1186Score: 5.0 (Medium)
1187Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652 1187Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string.
1188 1188Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
1189CVE name: CVE-2016-5636 1189
1190Package: CPython 1190CVE-2015-8666
1191Score: 10.0 (High) 1191Package: Qemu
1192Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. 1192Score: 1.9 (Low)
1193Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 1193Description: Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
1194 1194Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666
1195CVE name: CVE-2016-5403 1195
1196Package: Qemu 1196CVE-2015-8613
1197Score: 5.0 (Medium) 1197Package: Qemu
1198Description: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion. 1198Score: 1.9 (Low)
1199Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403 1199Description: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
1200 1200Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
1201CVE name: CVE-2016-5338 1201
1202Package: Qemu 1202CVE-2015-8568
1203Score: 5.0 (Medium) 1203Package: Qemu
1204Description: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer. 1204Score: 4.7 (Medium)
1205Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338 1205Description: Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
1206 1206Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
1207CVE name: CVE-2016-5337 1207
1208Package: Qemu 1208CVE-2015-8567
1209Score: 2.0 (Low) 1209Package: Qemu
1210Description: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. 1210Score: 6.8 (Medium)
1211Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337 1211Description: Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
1212 1212Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
1213CVE name: CVE-2016-5300 1213
1214Package: expat 1214CVE-2015-8558
1215Score: 7.8 (High) 1215Package: Qemu
1216Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. 1216Score: 5.0 (Medium)
1217Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 1217Description: The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
1218 1218Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
1219CVE name: CVE-2016-5238 1219
1220Package: Qemu 1220CVE-2015-7512
1221Score: 2.0 (Low) 1221Package: Qemu
1222Description: The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode. 1222Score: 7.0 (High)
1223Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238 1223Description: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
1224 1224Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
1225CVE name: CVE-2016-5131 1225
1226Package: libxml2 1226CVE-2015-7295
1227Score: 10.0 (High) 1227Package: Qemu
1228Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. 1228Score: 5.0 (Medium)
1229Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 1229Description: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
1230 1230Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
1231CVE name: CVE-2016-5126 1231
1232Package: Qemu 1232CVE-2015-6855
1233Score: 5.0 (Medium) 1233Package: Qemu
1234Description: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. 1234Score: 10.0 (High)
1235Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126 1235Description: hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
1236 1236Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
1237CVE name: CVE-2016-5107 1237
1238Package: Qemu 1238CVE-2015-5224
1239Score: 2.0 (Low) 1239Package: util-linux
1240Description: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors. 1240Score: 7.5 (High)
1241Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107 1241Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
1242 1242Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224
1243CVE name: CVE-2016-5106 1243
1244Package: Qemu 1244CVE-2015-5158
1245Score: 2.0 (Low) 1245Package: Qemu
1246Description: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command. 1246Score: 4.0 (Medium)
1247Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106 1247Description: Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
1248 1248Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158
1249CVE name: CVE-2016-5105 1249
1250Package: Qemu 1250CVE-2015-4106
1251Score: 2.0 (Low) 1251Package: Qemu
1252Description: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command. 1252Score: 7.0 (High)
1253Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105 1253Description: QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
1254 1254Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
1255CVE name: CVE-2016-5008 1255
1256Package: libvirt 1256CVE-2015-3209
1257Score: 4.3 (Medium) 1257Package: Qemu
1258Description: libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server. 1258Score: 8.0 (High)
1259Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008 1259Description: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
1260 1260Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
1261CVE name: CVE-2016-4964 1261
1262Package: Qemu 1262CVE-2015-1779
1263Score: 5.0 (Medium) 1263Package: Qemu
1264Description: The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s->state. 1264Score: 8.0 (High)
1265Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964 1265Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
1266 1266Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
1267CVE name: CVE-2016-4952 1267
1268Package: Qemu 1268CVE-2014-9365
1269Score: 2.0 (Low) 1269Package: python
1270Description: QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command. 1270Score: 5.8 (Medium)
1271Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952 1271Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
1272 1272Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365
1273CVE name: CVE-2016-4658 1273
1274Package: libxml2 1274CVE-2014-7840
1275Score: 10.0 (High) 1275Package: Qemu
1276Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. 1276Score: 8.0 (High)
1277Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 1277Description: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
1278 1278Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840
1279CVE name: CVE-2016-4454 1279
1280Package: Qemu 1280CVE-2014-5388
1281Score: 3.0 (Low) 1281Package: Qemu
1282Description: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read. 1282Score: 5.0 (Medium)
1283Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454 1283Description: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption.
1284 1284Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5388
1285CVE name: CVE-2016-4453 1285
1286Package: Qemu 1286CVE-2014-3615
1287Score: 5.0 (Medium) 1287Package: Qemu
1288Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command. 1288Score: 2.0 (Low)
1289Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453 1289Description: The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
1290 1290Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615
1291CVE name: CVE-2016-4448 1291
1292Package: libxml2 1292CVE-2009-0590
1293Score: 10.0 (High) 1293Package: OpenSSL
1294Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. 1294Score: 5.0 (Medium)
1295Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 1295Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
1296 1296Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590
1297CVE name: CVE-2016-4441 1297
1298Package: Qemu
1299Score: 2.0 (Low)
1300Description: The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
1301Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441
1302
1303CVE name: CVE-2016-4439
1304Package: Qemu
1305Score: 5.0 (Medium)
1306Description: The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
1307Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439
1308
1309CVE name: CVE-2016-4037
1310Package: Qemu
1311Score: 5.0 (Medium)
1312Description: The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
1313Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037
1314
1315CVE name: CVE-2016-4020
1316Package: Qemu
1317Score: 2.0 (Low)
1318Description: The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
1319Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020
1320
1321CVE name: CVE-2016-4002
1322Package: Qemu
1323Score: 7.0 (High)
1324Description: Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
1325Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002
1326
1327CVE name: CVE-2016-4001
1328Package: Qemu
1329Score: 4.0 (Medium)
1330Description: Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
1331Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001
1332
1333CVE name: CVE-2016-3991
1334Package: tiff
1335Score: 6.8 (Medium)
1336Description: Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
1337Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991
1338
1339CVE name: CVE-2016-3990
1340Package: tiff
1341Score: 6.8 (Medium)
1342Description: Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
1343Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990
1344
1345CVE name: CVE-2016-3945
1346Package: tiff
1347Score: 6.8 (Medium)
1348Description: Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
1349Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945
1350
1351CVE name: CVE-2016-3712
1352Package: Qemu
1353Score: 2.0 (Low)
1354Description: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
1355Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712
1356
1357CVE name: CVE-2016-3710
1358Package: Qemu
1359Score: 7.0 (High)
1360Description: The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue.
1361Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710
1362
1363CVE name: CVE-2016-3658
1364Package: tiff
1365Score: 5.0 (Medium)
1366Description: The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
1367Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658
1368
1369CVE name: CVE-2016-3632
1370Package: tiff
1371Score: 6.0 (Medium)
1372Description: Out-of-bounds write vulnerability was found in _TIFFVGetField function in tif_dirinfo.c, allowing attacker to cause a denial of service or command execution via a crafted TIFF image.
1373Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632
1374
1375CVE name: CVE-2016-3623
1376Package: tiff
1377Score: 5.0 (Medium)
1378Description: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
1379Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623
1380
1381CVE name: CVE-2016-3622
1382Package: tiff
1383Score: 4.3 (Medium)
1384Description: The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
1385Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622
1386
1387CVE name: CVE-2016-2858
1388Package: Qemu
1389Score: 2.0 (Low)
1390Description: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.
1391Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
1392
1393CVE name: CVE-2016-2857
1394Package: Qemu
1395Score: 2.0 (Low)
1396Description: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
1397Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857
1398
1399CVE name: CVE-2016-2775
1400Package: bind
1401Score: 4.3 (Medium)
1402Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
1403Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
1404
1405CVE name: CVE-2016-2391
1406Package: Qemu
1407Score: 2.0 (Low)
1408Description: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
1409Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391
1410
1411CVE name: CVE-2016-2381
1412Package: Perl
1413Score: 5.0 (Medium)
1414Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
1415Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
1416
1417CVE name: CVE-2016-2183
1418Package: OpenSSL
1419Score: 5.0 (Medium)
1420Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
1421Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
1422
1423CVE name: CVE-2016-2147
1424Package: busybox
1425Score: 5.0 (Medium)
1426Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
1427Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147
1428
1429CVE name: CVE-2016-1568
1430Package: Qemu
1431Score: 9.0 (High)
1432Description: Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
1433Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
1434
1435CVE name: CVE-2016-1238
1436Package: Qemu
1437Score: 7.0 (High)
1438Description: (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
1439Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
1440
1441CVE name: CVE-2016-0800
1442Package: OpenSSL
1443Score: 4.3 (Medium)
1444Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
1445Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
1446
1447CVE name: CVE-2016-0718
1448Package: expat
1449Score: 7.5 (High)
1450Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
1451Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
1452
1453CVE name: CVE-2016-0634
1454Package: Bash
1455Score: 5.0 (Medium)
1456Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string.
1457Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
1458
1459CVE name: CVE-2015-9019
1460Package: libxslt-native
1461Score: 5.0 (Medium)
1462Description: In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs
1463Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
1464
1465CVE name: CVE-2015-8666
1466Package: Qemu
1467Score: 1.9 (Low)
1468Description: Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator.
1469Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666
1470
1471CVE name: CVE-2015-8613
1472Package: Qemu
1473Score: 1.9 (Low)
1474Description: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
1475Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
1476
1477CVE name: CVE-2015-8568
1478Package: Qemu
1479Score: 4.7 (Medium)
1480Description: Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
1481Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
1482
1483CVE name: CVE-2015-8567
1484Package: Qemu
1485Score: 6.8 (Medium)
1486Description: Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
1487Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
1488
1489CVE name: CVE-2015-8558
1490Package: Qemu
1491Score: 5.0 (Medium)
1492Description: The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
1493Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
1494
1495CVE name: CVE-2015-7512
1496Package: Qemu
1497Score: 7.0 (High)
1498Description: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
1499Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
1500
1501CVE name: CVE-2015-7295
1502Package: Qemu
1503Score: 5.0 (Medium)
1504Description: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
1505Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
1506
1507CVE name: CVE-2015-6855
1508Package: Qemu
1509Score: 10.0 (High)
1510Description: hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
1511Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855
1512
1513CVE name: CVE-2015-5224
1514Package: util-linux
1515Score: 7.5 (High)
1516Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
1517Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224
1518
1519CVE name: CVE-2015-5158
1520Package: Qemu
1521Score: 4.0 (Medium)
1522Description: Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block.
1523Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158
1524
1525CVE name: CVE-2015-4106
1526Package: Qemu
1527Score: 7.0 (High)
1528Description: QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
1529Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
1530
1531CVE name: CVE-2015-3209
1532Package: Qemu
1533Score: 8.0 (High)
1534Description: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
1535Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
1536
1537CVE name: CVE-2015-1779
1538Package: Qemu
1539Score: 8.0 (High)
1540Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
1541Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779