summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--doc/book-enea-nfv-access-security-report41
1 files changed, 13 insertions, 28 deletions
diff --git a/doc/book-enea-nfv-access-security-report b/doc/book-enea-nfv-access-security-report
index 627e433..8e498c3 100644
--- a/doc/book-enea-nfv-access-security-report
+++ b/doc/book-enea-nfv-access-security-report
@@ -154,10 +154,22 @@ Score: 7.5 (High)
154Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. 154Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
156 156
157CVE-2017-8072
158Package: Kernel
159Score: 7.2 (High)
160Description: The cp2114_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux Kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
161Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072
162
163CVE-2017-8070
164Package: Kernel
165Score: 7.2 (High)
166Description: drivers/net/usb/catc.c in the Linux Kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
167Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070
168
157CVE name: CVE-2017-8069 169CVE name: CVE-2017-8069
158Package: kernel 170Package: kernel
159Score: 7.2 (High) 171Score: 7.2 (High)
160Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 172Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
161Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 173Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069
162 174
163CVE name: CVE-2017-8068 175CVE name: CVE-2017-8068
@@ -1527,30 +1539,3 @@ Package: Qemu
1527Score: 8.0 (High) 1539Score: 8.0 (High)
1528Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section. 1540Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
1529Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 1541Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
1530
1531CVE name: CVE-2014-9365
1532Package: python
1533Score: 5.8 (Medium)
1534Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
1535Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365
1536
1537CVE name: CVE-2014-7840
1538Package: Qemu
1539Score: 8.0(High)
1540Status EL7: Fixed
1541Description: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
1542Ref: https://cve.mitre
1543
1544CVE name: CVE-2014-5388
1545Package: Qemu
1546Score: 5.0(Medium)
1547Status EL7: Fixed
1548Description: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption.
1549Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5388
1550
1551CVE name: CVE-2014-3615
1552Package: Qemu
1553Score: 2.0(Low)
1554Status EL7: Fixed
1555Description: The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
1556Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615