diff options
-rw-r--r-- | doc/book-enea-nfv-access-security-report | 41 |
1 files changed, 13 insertions, 28 deletions
diff --git a/doc/book-enea-nfv-access-security-report b/doc/book-enea-nfv-access-security-report index 627e433..8e498c3 100644 --- a/doc/book-enea-nfv-access-security-report +++ b/doc/book-enea-nfv-access-security-report | |||
@@ -154,10 +154,22 @@ Score: 7.5 (High) | |||
154 | Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. | 154 | Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. |
155 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 | 155 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 |
156 | 156 | ||
157 | CVE-2017-8072 | ||
158 | Package: Kernel | ||
159 | Score: 7.2 (High) | ||
160 | Description: The cp2114_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux Kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. | ||
161 | Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072 | ||
162 | |||
163 | CVE-2017-8070 | ||
164 | Package: Kernel | ||
165 | Score: 7.2 (High) | ||
166 | Description: drivers/net/usb/catc.c in the Linux Kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | ||
167 | Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070 | ||
168 | |||
157 | CVE name: CVE-2017-8069 | 169 | CVE name: CVE-2017-8069 |
158 | Package: kernel | 170 | Package: kernel |
159 | Score: 7.2 (High) | 171 | Score: 7.2 (High) |
160 | Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 172 | Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
161 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 | 173 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 |
162 | 174 | ||
163 | CVE name: CVE-2017-8068 | 175 | CVE name: CVE-2017-8068 |
@@ -1527,30 +1539,3 @@ Package: Qemu | |||
1527 | Score: 8.0 (High) | 1539 | Score: 8.0 (High) |
1528 | Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section. | 1540 | Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section. |
1529 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 | 1541 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 |
1530 | |||
1531 | CVE name: CVE-2014-9365 | ||
1532 | Package: python | ||
1533 | Score: 5.8 (Medium) | ||
1534 | Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | ||
1535 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365 | ||
1536 | |||
1537 | CVE name: CVE-2014-7840 | ||
1538 | Package: Qemu | ||
1539 | Score: 8.0(High) | ||
1540 | Status EL7: Fixed | ||
1541 | Description: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data. | ||
1542 | Ref: https://cve.mitre | ||
1543 | |||
1544 | CVE name: CVE-2014-5388 | ||
1545 | Package: Qemu | ||
1546 | Score: 5.0(Medium) | ||
1547 | Status EL7: Fixed | ||
1548 | Description: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption. | ||
1549 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5388 | ||
1550 | |||
1551 | CVE name: CVE-2014-3615 | ||
1552 | Package: Qemu | ||
1553 | Score: 2.0(Low) | ||
1554 | Status EL7: Fixed | ||
1555 | Description: The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution. | ||
1556 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615 | ||