diff options
-rw-r--r-- | doc/book-enea-nfv-access-security-report | 2838 |
1 files changed, 1297 insertions, 1541 deletions
diff --git a/doc/book-enea-nfv-access-security-report b/doc/book-enea-nfv-access-security-report index 8e498c3..3c8b3f1 100644 --- a/doc/book-enea-nfv-access-security-report +++ b/doc/book-enea-nfv-access-security-report | |||
@@ -1,1541 +1,1297 @@ | |||
1 | CVE name: CVE-2017-1000366 | 1 | CVE-2017-1000253 |
2 | Package: glibc | 2 | Package: kernel |
3 | Score: 7.2 (High) | 3 | Score: 8.0 (High) |
4 | Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. | 4 | Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 |
5 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 | 5 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253 |
6 | 6 | ||
7 | CVE name: CVE-2017-1000364 | 7 | CVE-2017-14496 |
8 | Package: Kernel | 8 | Package: dnsmasq |
9 | Score: 7.0 (High) | 9 | Score: 7.0 (High) |
10 | Description: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010). | 10 | Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request. |
11 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364 | 11 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 |
12 | 12 | ||
13 | CVE name: CVE-2017-1000253 | 13 | CVE-2017-14495 |
14 | Package: kernel | 14 | Package: dnsmasq |
15 | Score: 8.0 (High) | 15 | Score: 7.0 (High) |
16 | Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 | 16 | Description: Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. |
17 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253 | 17 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495 |
18 | 18 | ||
19 | CVE name: CVE-2017-1000101 | 19 | CVE-2017-14494 |
20 | Package: curl | 20 | Package: dnsmasq |
21 | Score: 4.0 (Medium) | 21 | Score: 7.0 (High) |
22 | Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing. | 22 | Description: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests. |
23 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101 | 23 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494 |
24 | 24 | ||
25 | CVE name: CVE-2017-1000100 | 25 | CVE-2017-14493 |
26 | Package: curl | 26 | Package: dnsmasq |
27 | Score: 4.0 (Medium) | 27 | Score: 9.0 (High) |
28 | Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer. | 28 | Description: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. |
29 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 | 29 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493 |
30 | 30 | ||
31 | CVE name: CVE-2017-1000082 | 31 | CVE-2017-14492 |
32 | Package: systemd | 32 | Package: dnsmasq |
33 | Score: 10.0 (High) | 33 | Score: 9.0 (High) |
34 | Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended. | 34 | Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request. |
35 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082 | 35 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492 |
36 | 36 | ||
37 | CVE name: CVE-2017-14496 | 37 | CVE-2017-14491 |
38 | Package: dnsmasq | 38 | Package: dnsmasq |
39 | Score: 7.0 (High) | 39 | Score: 9.0 (High) |
40 | Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request. | 40 | Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. |
41 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 | 41 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491 |
42 | 42 | ||
43 | CVE name: CVE-2017-14495 | 43 | CVE-2017-12132 |
44 | Package: dnsmasq | 44 | Package: glibc |
45 | Score: 7.0 (High) | 45 | Score: 4.3 (Medium) |
46 | Description: Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation. | 46 | Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation. |
47 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495 | 47 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132 |
48 | 48 | ||
49 | CVE name: CVE-2017-14494 | 49 | CVE-2017-11176 |
50 | Package: dnsmasq | 50 | Package: kernel |
51 | Score: 7.0 (High) | 51 | Score: 10.0 (High) |
52 | Description: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests. | 52 | Description: The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. |
53 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494 | 53 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176 |
54 | 54 | ||
55 | CVE name: CVE-2017-14493 | 55 | CVE-2017-1000366 |
56 | Package: dnsmasq | 56 | Package: glibc |
57 | Score: 9.0 (High) | 57 | Score: 7.2 (High) |
58 | Description: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. | 58 | Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. |
59 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493 | 59 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 |
60 | 60 | ||
61 | CVE name: CVE-2017-14492 | 61 | CVE-2017-1000364 |
62 | Package: dnsmasq | 62 | Package: Kernel |
63 | Score: 9.0 (High) | 63 | Score: 7.0 (High) |
64 | Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request. | 64 | Description: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010). |
65 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492 | 65 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364 |
66 | 66 | ||
67 | CVE name: CVE-2017-14491 | 67 | CVE-2017-1000257 |
68 | Package: dnsmasq | 68 | Package: curl |
69 | Score: 9.0 (High) | 69 | Score: 6.4 (Medium) |
70 | Description: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. | 70 | Description: An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded. |
71 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491 | 71 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257 |
72 | 72 | ||
73 | CVE name: CVE-2017-12132 | 73 | CVE-2017-1000101 |
74 | Package: glibc | 74 | Package: curl |
75 | Score: 4.3 (Medium) | 75 | Score: 4.0 (Medium) |
76 | Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation. | 76 | Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing. |
77 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132 | 77 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101 |
78 | 78 | ||
79 | CVE name: CVE-2017-9445 | 79 | CVE-2017-1000100 |
80 | Package: systemd | 80 | Package: curl |
81 | Score: 5.0 (Medium) | 81 | Score: 4.0 (Medium) |
82 | Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. | 82 | Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer. |
83 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445 | 83 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 |
84 | 84 | ||
85 | CVE name: CVE-2017-9216 | 85 | CVE-2017-1000082 |
86 | Package: ghostscript | 86 | Package: systemd |
87 | Score: 4.3 (Medium) | 87 | Score: 10.0 (High) |
88 | Description: libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file. | 88 | Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended. |
89 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216 | 89 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082 |
90 | 90 | ||
91 | CVE name: CVE-2017-9050 | 91 | CVE-2017-9445 |
92 | Package: libxml2-native | 92 | Package: systemd |
93 | Score: 5.0 (Medium) | 93 | Score: 5.0 (Medium) |
94 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. | 94 | Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. |
95 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 | 95 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445 |
96 | 96 | ||
97 | CVE name: CVE-2017-9049 | 97 | CVE-2017-9050 |
98 | Package: libxml2-native | 98 | Package: libxml2-native |
99 | Score: 5.0 (Medium) | 99 | Score: 5.0 (Medium) |
100 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398. | 100 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. |
101 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 | 101 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 |
102 | 102 | ||
103 | CVE name: CVE-2017-9048 | 103 | CVE-2017-9049 |
104 | Package: libxml2-native | 104 | Package: libxml2-native |
105 | Score: 5.0 (Medium) | 105 | Score: 5.0 (Medium) |
106 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | 106 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398. |
107 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 | 107 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 |
108 | 108 | ||
109 | CVE name: CVE-2017-9047 | 109 | CVE-2017-9048 |
110 | Package: libxml2-native | 110 | Package: libxml2-native |
111 | Score: 5.0 (Medium) | 111 | Score: 5.0 (Medium) |
112 | Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash. | 112 | Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. |
113 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 | 113 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 |
114 | 114 | ||
115 | CVE name: CVE-2017-8872 | 115 | CVE-2017-9047 |
116 | Package: libxml2-native | 116 | Package: libxml2-native |
117 | Score: 6.4 (Medium) | 117 | Score: 5.0 (Medium) |
118 | Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. | 118 | Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash. |
119 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 | 119 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 |
120 | 120 | ||
121 | CVE name: CVE-2017-8831 | 121 | CVE-2017-8872 |
122 | Package: kernel | 122 | Package: libxml2-native |
123 | Score: 7.2 (High) | 123 | Score: 6.4 (Medium) |
124 | Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. | 124 | Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. |
125 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831 | 125 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 |
126 | 126 | ||
127 | CVE name: CVE-2017-8804 | 127 | CVE-2017-8831 |
128 | Package: glibc | 128 | Package: kernel |
129 | Score: 7.8 (High) | 129 | Score: 7.2 (High) |
130 | Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. | 130 | Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. |
131 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804 | 131 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831 |
132 | 132 | ||
133 | CVE name: CVE-2017-8779 | 133 | CVE-2017-8817 |
134 | Package: rpcbind | 134 | Package: curl |
135 | Score: 7.8 (High) | 135 | Score: 5.0 (Medium) |
136 | Description: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb | 136 | Description: libcurl contains a read out of bounds flaw in the FTP wildcard function.libcurl's FTP wildcard matching feature, which is enabled with the CURLOPT_WILDCARDMATCH option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket ([) but instead it will continue reading the heap beyond the end of the URL buffer that holds the wildcard.For applications that use HTTP(S) URLs, allow libcurl to handle redirects and have FTP wildcards enabled, this flaw can be triggered by malicious servers that can redirect clients to a URL using such a wildcard pattern.We are not aware of any exploit of this flaw. |
137 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779 | 137 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817 |
138 | 138 | ||
139 | CVE name: CVE-2017-8392 | 139 | CVE-2017-8816 |
140 | Package: binutils | 140 | Package: curl |
141 | Score: 5.0 (Medium) | 141 | Score: 5.0 (Medium) |
142 | Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. | 142 | Description: libcurl contains a buffer overrun flaw in the NTLM authentication code.The internal function Curl_ntlm_core_mk_ntlmv2_hash sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap.The SUvalue is subsequently used to iterate over the input and generate output into the storage buffer. On systems with a 32 bit size_t, the math to calculate SIZE triggers an integer overflow when the combined lengths of the user name and password is larger than 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a buffer overrun.We are not aware of any exploit of this flaw. |
143 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392 | 143 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816 |
144 | 144 | ||
145 | CVE name: CVE-2017-8309 | 145 | CVE-2017-8804 |
146 | Package: Qemu | 146 | Package: glibc |
147 | Score: 7.8 (High) | 147 | Score: 7.8 (High) |
148 | Description: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture. | 148 | Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. |
149 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309 | 149 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804 |
150 | 150 | ||
151 | CVE name: CVE-2017-8105 | 151 | CVE-2017-8392 |
152 | Package: freetype | 152 | Package: binutils |
153 | Score: 7.5 (High) | 153 | Score: 5.0 (Medium) |
154 | Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. | 154 | Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. |
155 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 | 155 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392 |
156 | 156 | ||
157 | CVE-2017-8072 | 157 | CVE-2017-8309 |
158 | Package: Kernel | 158 | Package: Qemu |
159 | Score: 7.2 (High) | 159 | Score: 7.8 (High) |
160 | Description: The cp2114_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux Kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. | 160 | Description: Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture. |
161 | Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072 | 161 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309 |
162 | 162 | ||
163 | CVE-2017-8070 | 163 | CVE-2017-8105 |
164 | Package: Kernel | 164 | Package: freetype |
165 | Score: 7.2 (High) | 165 | Score: 7.5 (High) |
166 | Description: drivers/net/usb/catc.c in the Linux Kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 166 | Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. |
167 | Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070 | 167 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 |
168 | 168 | ||
169 | CVE name: CVE-2017-8069 | 169 | CVE-2017-8069 |
170 | Package: kernel | 170 | Package: kernel |
171 | Score: 7.2 (High) | 171 | Score: 7.2 (High) |
172 | Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 172 | Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
173 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 | 173 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 |
174 | 174 | ||
175 | CVE name: CVE-2017-8068 | 175 | CVE-2017-8068 |
176 | Package: kernel | 176 | Package: kernel |
177 | Score: 7.2 (High) | 177 | Score: 7.2 (High) |
178 | Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 178 | Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
179 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068 | 179 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068 |
180 | 180 | ||
181 | CVE name: CVE-2017-8067 | 181 | CVE-2017-8067 |
182 | Package: kernel | 182 | Package: kernel |
183 | Score: 7.2 (High) | 183 | Score: 7.2 (High) |
184 | Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 184 | Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
185 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067 | 185 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067 |
186 | 186 | ||
187 | CVE name: CVE-2017-8066 | 187 | CVE-2017-8066 |
188 | Package: kernel | 188 | Package: kernel |
189 | Score: 7.2 (High) | 189 | Score: 7.2 (High) |
190 | Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 190 | Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
191 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066 | 191 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066 |
192 | 192 | ||
193 | CVE name: CVE-2017-8065 | 193 | CVE-2017-8064 |
194 | Package: kernel | 194 | Package: kernel |
195 | Score: 7.2 (High) | 195 | Score: 7.2 (High) |
196 | Description: rypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 196 | Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
197 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065 | 197 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064 |
198 | 198 | ||
199 | CVE name: CVE-2017-8064 | 199 | CVE-2017-8063 |
200 | Package: kernel | 200 | Package: kernel |
201 | Score: 7.2 (High) | 201 | Score: 7.2 (High) |
202 | Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 202 | Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
203 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064 | 203 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063 |
204 | 204 | ||
205 | CVE name: CVE-2017-8063 | 205 | CVE-2017-8062 |
206 | Package: kernel | 206 | Package: kernel |
207 | Score: 7.2 (High) | 207 | Score: 7.2 (High) |
208 | Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 208 | Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. |
209 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063 | 209 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062 |
210 | 210 | ||
211 | CVE name: CVE-2017-8062 | 211 | CVE-2017-7869 |
212 | Package: kernel | 212 | Package: gnutls |
213 | Score: 7.2 (High) | 213 | Score: 5.0 (Medium) |
214 | Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 214 | Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. |
215 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062 | 215 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 |
216 | 216 | ||
217 | CVE name: CVE-2017-7975 | 217 | CVE-2017-7645 |
218 | Package: Ghostscript | 218 | Package: kernel |
219 | Score: 6.8 (Medium) | 219 | Score: 7.8 (High) |
220 | Description: Artifex jbig2dec 0.13, as used in Ghostscript, allows out-of-bounds writes because of an integer overflow in the jbig2_build_huffman_table function in jbig2_huffman.c during operations on a crafted JBIG2 file, leading to a denial of service (application crash) or possibly execution of arbitrary code. | 220 | Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. |
221 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7975 | 221 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645 |
222 | 222 | ||
223 | CVE name: CVE-2017-7895 | 223 | CVE-2017-7618 |
224 | Package: kernel | 224 | Package: kernel |
225 | Score: 10.0 (High) | 225 | Score: 7.8 (High) |
226 | Description: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. | 226 | Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. |
227 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895 | 227 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618 |
228 | 228 | ||
229 | CVE name: CVE-2017-7869 | 229 | CVE-2017-7487 |
230 | Package: gnutls | 230 | Package: kernel |
231 | Score: 5.0 (Medium) | 231 | Score: 7.2 (High) |
232 | Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. | 232 | Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. |
233 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 | 233 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487 |
234 | 234 | ||
235 | CVE name: CVE-2017-7645 | 235 | CVE-2017-7471 |
236 | Package: kernel | 236 | Package: Qemu |
237 | Score: 7.8 (High) | 237 | Score: 0.0 (Low) |
238 | Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. | 238 | Description: Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory.A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. |
239 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645 | 239 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471 |
240 | 240 | ||
241 | CVE name: CVE-2017-7618 | 241 | CVE-2017-7468 |
242 | Package: kernel | 242 | Package: curl |
243 | Score: 7.8 (High) | 243 | Score: 6.0 (Medium) |
244 | Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. | 244 | Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). |
245 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618 | 245 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468 |
246 | 246 | ||
247 | CVE name: CVE-2017-7487 | 247 | CVE-2017-7407 |
248 | Package: kernel | 248 | Package: curl |
249 | Score: 7.2 (High) | 249 | Score: 2.1 (Low) |
250 | Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. | 250 | Description: The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read. |
251 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487 | 251 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407 |
252 | 252 | ||
253 | CVE name: CVE-2017-7471 | 253 | CVE-2017-7304 |
254 | Package: Qemu | 254 | Package: binutils |
255 | Score: 0.0 (Low) | 255 | Score: 5.0 (Medium) |
256 | Description: Quick Emulator(Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory.A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host. | 256 | Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash. |
257 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471 | 257 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304 |
258 | 258 | ||
259 | CVE name: CVE-2017-7468 | 259 | CVE-2017-7210 |
260 | Package: curl | 260 | Package: binutils |
261 | Score: 6.0 (Medium) | 261 | Score: 7.8 (High) |
262 | Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). | 262 | Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash. |
263 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468 | 263 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 |
264 | 264 | ||
265 | CVE name: CVE-2017-7304 | 265 | CVE-2017-7209 |
266 | Package: Binutils | 266 | Package: binutils |
267 | Score: 5.0 (Medium) | 267 | Score: 4.3 (Medium) |
268 | Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash. | 268 | Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash. |
269 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304 | 269 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209 |
270 | 270 | ||
271 | CVE name: CVE-2017-7210 | 271 | CVE-2017-6969 |
272 | Package: binutils | 272 | Package: binutils |
273 | Score: 7.8 (High) | 273 | Score: 6.4 (Medium) |
274 | Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash. | 274 | Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well. |
275 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 | 275 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969 |
276 | 276 | ||
277 | CVE name: CVE-2017-7209 | 277 | CVE-2017-6966 |
278 | Package: binutils | 278 | Package: binutil |
279 | Score: 4.3 (Medium) | 279 | Score: 4.0 (Medium) |
280 | Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash. | 280 | Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations. |
281 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209 | 281 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966 |
282 | 282 | ||
283 | CVE name: CVE-2017-7207 | 283 | CVE-2017-6965 |
284 | Package: ghostscript | 284 | Package: binutils |
285 | Score: 4.3 (Medium) | 285 | Score: 4.3 (Medium) |
286 | Description: The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document. | 286 | Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow. |
287 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207 | 287 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965 |
288 | 288 | ||
289 | CVE name: CVE-2017-6969 | 289 | CVE-2017-6505 |
290 | Package: binutils | 290 | Package: Qemu |
291 | Score: 6.4 (Medium) | 291 | Score: 4.0 (Medium) |
292 | Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well. | 292 | Description: Quick Emulator built with the USB OHCI Emulation support is vulnerable to aninfinite loop issue. It could occur while processing an endpoint listdescriptor in ohci_service_ed_list().A guest user/process could use this flaw to crash Qemu process resulting in DoS. |
293 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969 | 293 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505 |
294 | 294 | ||
295 | CVE name: CVE-2017-6966 | 295 | CVE-2017-6353 |
296 | Package: binutil | 296 | Package: Kernel |
297 | Score: 4.0 (Medium) | 297 | Score: 5.0 (Medium) |
298 | Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations. | 298 | Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. |
299 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966 | 299 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353 |
300 | 300 | ||
301 | CVE name: CVE-2017-6965 | 301 | CVE-2017-6348 |
302 | Package: binutils | 302 | Package: Kernel |
303 | Score: 4.3 (Medium) | 303 | Score: 5.0 (Medium) |
304 | Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow. | 304 | Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices. |
305 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965 | 305 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348 |
306 | 306 | ||
307 | CVE name: CVE-2017-6874 | 307 | CVE-2017-6345 |
308 | Package: Kernel | 308 | Package: Kernel |
309 | Score: 7.0 (High) | 309 | Score: 5.0 (Medium) |
310 | Description: Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts. | 310 | Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls. |
311 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874 | 311 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345 |
312 | 312 | ||
313 | CVE name: CVE-2017-6505 | 313 | CVE-2017-6214 |
314 | Package: Qemu | 314 | Package: Kernel |
315 | Score: 4.0 (Medium) | 315 | Score: 5.0 (Medium) |
316 | Description: Quick Emulator built with the USB OHCI Emulation support is vulnerable to aninfinite loop issue. It could occur while processing an endpoint listdescriptor in ohci_service_ed_list().A guest user/process could use this flaw to crash Qemu process resulting in DoS. | 316 | Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. |
317 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505 | 317 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214 |
318 | 318 | ||
319 | CVE name: CVE-2017-6353 | 319 | CVE-2017-6058 |
320 | Package: Kernel | 320 | Package: Qemu |
321 | Score: 5.0 (Medium) | 321 | Score: 5.0 (Medium) |
322 | Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. | 322 | Description: Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping. |
323 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353 | 323 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058 |
324 | 324 | ||
325 | CVE name: CVE-2017-6348 | 325 | CVE-2017-5986 |
326 | Package: Kernel | 326 | Package: Kernel |
327 | Score: 5.0 (Medium) | 327 | Score: 7.0 (High) |
328 | Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices. | 328 | Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state. |
329 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348 | 329 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986 |
330 | 330 | ||
331 | CVE name: CVE-2017-6347 | 331 | CVE-2017-5970 |
332 | Package: Kernel | 332 | Package: Kernel |
333 | Score: 7.0 (High) | 333 | Score: 5.0 (Medium) |
334 | Description: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission. | 334 | Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options. |
335 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347 | 335 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970 |
336 | 336 | ||
337 | CVE name: CVE-2017-6346 | 337 | CVE-2017-5969 |
338 | Package: Kernel | 338 | Package: libxml2-native |
339 | Score: 7.0 (High) | 339 | Score: 2.6 (Low) |
340 | Description: Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls. | 340 | Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser." |
341 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346 | 341 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969 |
342 | 342 | ||
343 | CVE name: CVE-2017-6345 | 343 | CVE-2017-5931 |
344 | Package: Kernel | 344 | Package: Qemu |
345 | Score: 5.0 (Medium) | 345 | Score: 6.0 (Medium) |
346 | Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls. | 346 | Description: Quick Emulator(Qemu) built with the Virtio crypto device emulation support isvulnerable to an integer overflow issue. It could occur while handling dataencryption/decryption requests in 'virtio_crypto_handle_sym_req'.A privileged user inside guest could use this flaw to crash the Qemu processresulting in DoS or potentially execute arbitrary code on the host withprivileges of the Qemu process. |
347 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345 | 347 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931 |
348 | 348 | ||
349 | CVE name: CVE-2017-6214 | 349 | CVE-2017-5848 |
350 | Package: Kernel | 350 | Package: gstreamer |
351 | Score: 5.0 (Medium) | 351 | Score: 5.0 (Medium) |
352 | Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. | 352 | Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing. |
353 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214 | 353 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848 |
354 | 354 | ||
355 | CVE name: CVE-2017-6074 | 355 | CVE-2017-5847 |
356 | Package: Kernel | 356 | Package: gstreamer |
357 | Score: 8.0 (High) | 357 | Score: 5.0 (Medium) |
358 | Description: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. | 358 | Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors. |
359 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074 | 359 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847 |
360 | 360 | ||
361 | CVE name: CVE-2017-6058 | 361 | CVE-2017-5669 |
362 | Package: Qemu | 362 | Package: Kernel |
363 | Score: 5.0 (Medium) | 363 | Score: 5.0 (Medium) |
364 | Description: Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping. | 364 | Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context. |
365 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058 | 365 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669 |
366 | 366 | ||
367 | CVE name: CVE-2017-6001 | 367 | CVE-2017-5618 |
368 | Package: Kernel | 368 | Package: GNU screen |
369 | Score: 8.0 (High) | 369 | Score: 7.2 (High) |
370 | Description: Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786. | 370 | Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions. |
371 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001 | 371 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618 |
372 | 372 | ||
373 | CVE name: CVE-2017-5986 | 373 | CVE-2017-5577 |
374 | Package: Kernel | 374 | Package: Kernel |
375 | Score: 7.0 (High) | 375 | Score: 5.0 (Medium) |
376 | Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state. | 376 | Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call. |
377 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986 | 377 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577 |
378 | 378 | ||
379 | CVE name: CVE-2017-5970 | 379 | CVE-2017-5551 |
380 | Package: Kernel | 380 | Package: Kernel |
381 | Score: 5.0 (Medium) | 381 | Score: 4.0 (Medium) |
382 | Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options. | 382 | Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. |
383 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970 | 383 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551 |
384 | 384 | ||
385 | CVE name: CVE-2017-5969 | 385 | CVE-2017-5335 |
386 | Package: libxml2-native | 386 | Package: GnuTLS |
387 | Score: 2.6 (Low) | 387 | Score: 5.0 (Medium) |
388 | Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser." | 388 | Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. |
389 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969 | 389 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 |
390 | 390 | ||
391 | CVE name: CVE-2017-5931 | 391 | CVE-2017-3737 |
392 | Package: Qemu | 392 | Package: OpenSSL |
393 | Score: 6.0 (Medium) | 393 | Score: 6.0 (Medium) |
394 | Description: Quick Emulator(Qemu) built with the Virtio crypto device emulation support isvulnerable to an integer overflow issue. It could occur while handling dataencryption/decryption requests in 'virtio_crypto_handle_sym_req'.A privileged user inside guest could use this flaw to crash the Qemu processresulting in DoS or potentially execute arbitrary code on the host withprivileges of the Qemu process. | 394 | Description: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state"mechanism. The intent was that if a fatal error occurred during a handshake thenOpenSSL would move into the error state and would immediately fail if youattempted to continue the handshake. This works as designed for the explicithandshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),however due to a bug it does not work correctly if SSL_read() or SSL_write() iscalled directly. In that scenario, if the handshake fails then a fatal errorwill be returned in the initial function call. If SSL_read()/SSL_write() issubsequently called by the application for the same SSL object then it willsucceed and the data is passed without being decrypted/encrypted directly fromthe SSL/TLS record layer.In order to exploit this issue an application bug would have to be present thatresulted in a call to SSL_read()/SSL_write() being issued after having alreadyreceived a fatal error.External References:https://www.openssl.org/news/secadv/20171207.txt |
395 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931 | 395 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737 |
396 | 396 | ||
397 | CVE name: CVE-2017-5848 | 397 | CVE-2017-3735 |
398 | Package: gstreamer | 398 | Package: OpenSSL |
399 | Score: 5.0 (Medium) | 399 | Score: 5.0 (Medium) |
400 | Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing. | 400 | Description: While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g. |
401 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848 | 401 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735 |
402 | 402 | ||
403 | CVE name: CVE-2017-5847 | 403 | CVE-2017-3731 |
404 | Package: gstreamer | 404 | Package: OpenSSL |
405 | Score: 5.0 (Medium) | 405 | Score: 5.0 (Medium) |
406 | Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors. | 406 | Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. |
407 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847 | 407 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 |
408 | 408 | ||
409 | CVE name: CVE-2017-5669 | 409 | CVE-2017-3136 |
410 | Package: Kernel | 410 | Package: bind |
411 | Score: 5.0 (Medium) | 411 | Score: 5.9 (Medium) |
412 | Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context. | 412 | Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. |
413 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669 | 413 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136 |
414 | 414 | ||
415 | CVE name: CVE-2017-5618 | 415 | CVE-2017-3135 |
416 | Package: GNU screen | 416 | Package: bind |
417 | Score: 7.2 (High) | 417 | Score: 6.0 (Medium) |
418 | Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions. | 418 | Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. |
419 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618 | 419 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 |
420 | 420 | ||
421 | CVE name: CVE-2017-5601 | 421 | CVE-2017-2628 |
422 | Package: ibarchive | 422 | Package: curl |
423 | Score: 5.0 (Medium) | 423 | Score: 0.0 (Low) |
424 | Description: An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive. | 424 | Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. |
425 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601 | 425 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628 |
426 | 426 | ||
427 | CVE name: CVE-2017-5577 | 427 | CVE-2017-2620 |
428 | Package: Kernel | 428 | Package: Qemu |
429 | Score: 5.0 (Medium) | 429 | Score: 9.0 (High) |
430 | Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call. | 430 | Description: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.Upstream patch: http://git.qemu-project.org/?p=qemu.git;a=commit;h=92f2b88cea48c6aeba8de568a45f2ed958f3c298 |
431 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577 | 431 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620 |
432 | 432 | ||
433 | CVE name: CVE-2017-5576 | 433 | |
434 | Package: Kernel | 434 | CVE-2016-9923 |
435 | Score: 7.0 (High) | 435 | Package: Qemu |
436 | Description: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call. | 436 | Score: 2.0 (Low) |
437 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576 | 437 | Description: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS. |
438 | 438 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923 | |
439 | CVE name: CVE-2017-5551 | 439 | |
440 | Package: Kernel | 440 | CVE-2016-9921 |
441 | Score: 4.0 (Medium) | 441 | Package: Qemu |
442 | Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. | 442 | Score: 2.0 (Low) |
443 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551 | 443 | Description: Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS. |
444 | 444 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921 | |
445 | CVE name: CVE-2017-5548 | 445 | |
446 | Package: Kernel | 446 | CVE-2016-9916 |
447 | Score: 7.0 (High) | 447 | Package: Qemu |
448 | Description: drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 448 | Score: 5.0 (Medium) |
449 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548 | 449 | Description: Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend. |
450 | 450 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916 | |
451 | CVE name: CVE-2017-5547 | 451 | |
452 | Package: Kernel | 452 | CVE-2016-9915 |
453 | Score: 7.0 (High) | 453 | Package: Qemu |
454 | Description: drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. | 454 | Score: 5.0 (Medium) |
455 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5547 | 455 | Description: Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend. |
456 | 456 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915 | |
457 | CVE name: CVE-2017-5546 | 457 | |
458 | Package: Kernel | 458 | CVE-2016-9914 |
459 | Score: 7.0 (High) | 459 | Package: Qemu |
460 | Description: The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number. | 460 | Score: 5.0 (Medium) |
461 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5546 | 461 | Description: Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations. |
462 | 462 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914 | |
463 | CVE name: CVE-2017-5335 | 463 | |
464 | Package: GnuTLS | 464 | CVE-2016-9913 |
465 | Score: 5.0 (Medium) | 465 | Package: Qemu |
466 | Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. | 466 | Score: 5.0 (Medium) |
467 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 | 467 | Description: Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup. |
468 | 468 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913 | |
469 | CVE name: CVE-2017-5225 | 469 | |
470 | Package: tiff | 470 | CVE-2016-9912 |
471 | Score: 7.5 (High) | 471 | Package: Qemu |
472 | Description: LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value. | 472 | Score: 2.0 (Low) |
473 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225 | 473 | Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. |
474 | 474 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912 | |
475 | CVE name: CVE-2017-5029 | 475 | |
476 | Package: libxslt | 476 | CVE-2016-9911 |
477 | Score: 6.8 (Medium) | 477 | Package: Qemu |
478 | Description: The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. | 478 | Score: 2.0 (Low) |
479 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029 | 479 | Description: Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. |
480 | 480 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911 | |
481 | CVE name: CVE-2017-3731 | 481 | |
482 | Package: OpenSSL | 482 | CVE-2016-9908 |
483 | Score: 5.0 (Medium) | 483 | Package: Qemu |
484 | Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. | 484 | Score: 2.0 (Low) |
485 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 | 485 | Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes. |
486 | 486 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908 | |
487 | CVE name: CVE-2017-3136 | 487 | |
488 | Package: bind | 488 | CVE-2016-9907 |
489 | Score: 5.9 (Medium) | 489 | Package: Qemu |
490 | Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. | 490 | Score: 2.0 (Low) |
491 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136 | 491 | Description: Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. |
492 | 492 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907 | |
493 | CVE name: CVE-2017-3135 | 493 | |
494 | Package: bind | 494 | CVE-2016-9846 |
495 | Score: 6.0 (Medium) | 495 | Package: Qemu |
496 | Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. | 496 | Score: 5.0 (Medium) |
497 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 | 497 | Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. |
498 | 498 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846 | |
499 | CVE name: CVE-2017-2636 | 499 | |
500 | Package: Kernel | 500 | CVE-2016-9845 |
501 | Score: 7.2 (High) | 501 | Package: Qemu |
502 | Description: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. | 502 | Score: 0.0 (Low) |
503 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636 | 503 | Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes. |
504 | 504 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845 | |
505 | CVE name: CVE-2017-2628 | 505 | |
506 | Package: curl | 506 | CVE-2016-9776 |
507 | Score: 0.0 (Low) | 507 | Package: Qemu |
508 | Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. | 508 | Score: 2.0 (Low) |
509 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628 | 509 | Description: QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS. |
510 | 510 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776 | |
511 | CVE name: CVE-2017-2620 | 511 | |
512 | Package: Qemu | 512 | CVE-2016-9754 |
513 | Score: 9.0 (High) | 513 | Package: Kernel |
514 | Description: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.Upstream patch: http://git.qemu-project.org/?p=qemu.git;a=commit;h=92f2b88cea48c6aeba8de568a45f2ed958f3c298 | 514 | Score: 7.0 (High) |
515 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620 | 515 | Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file. |
516 | 516 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754 | |
517 | CVE name: CVE-2016-10350 | 517 | |
518 | Package: libarchive | 518 | CVE-2016-9603 |
519 | Score: 4.3 (Medium) | 519 | Package: Qemu |
520 | Description: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | 520 | Score: 8.0 (High) |
521 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350 | 521 | Description: A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. |
522 | 522 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603 | |
523 | CVE name: CVE-2016-10349 | 523 | |
524 | Package: libarchive | 524 | CVE-2016-9444 |
525 | Score: 4.2 (Medium) | 525 | Package: bind |
526 | Description: The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | 526 | Score: 7.0 (High) |
527 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349 | 527 | Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer. |
528 | 528 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444 | |
529 | CVE name: CVE-2016-10229 | 529 | |
530 | Package: kernel | 530 | CVE-2016-9401 |
531 | Score: 10.0 (High) | 531 | Package: bash |
532 | Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag. | 532 | Score: 2.0 (Low) |
533 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229 | 533 | Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6 |
534 | 534 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401 | |
535 | CVE name: CVE-2016-10208 | 535 | |
536 | Package: Kernel | 536 | CVE-2016-9318 |
537 | Score: 5.0 (Medium) | 537 | Package: libxml2-native |
538 | Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image. | 538 | Score: 6.8 (Medium) |
539 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208 | 539 | Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. |
540 | 540 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 | |
541 | CVE name: CVE-2016-10200 | 541 | |
542 | Package: Kernel | 542 | CVE-2016-9106 |
543 | Score: 7.0 (High) | 543 | Package: Qemu |
544 | Description: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. | 544 | Score: 2.0 (Low) |
545 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200 | 545 | Description: Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector. |
546 | 546 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106 | |
547 | CVE name: CVE-2016-10154 | 547 | |
548 | Package: Kernel | 548 | CVE-2016-9105 |
549 | Score: 5.0 (Medium) | 549 | Package: Qemu |
550 | Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist. | 550 | Score: 2.0 (Low) |
551 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154 | 551 | Description: Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object. |
552 | 552 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105 | |
553 | CVE name: CVE-2016-10153 | 553 | |
554 | Package: Kernel | 554 | CVE-2016-9104 |
555 | Score: 7.0 (High) | 555 | Package: Qemu |
556 | Description: The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code. | 556 | Score: 2.0 (Low) |
557 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153 | 557 | Description: Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access. |
558 | 558 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104 | |
559 | CVE name: CVE-2016-10150 | 559 | |
560 | Package: KVM | 560 | CVE-2016-9103 |
561 | Score: 10.0 (High) | 561 | Package: Qemu |
562 | Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device. | 562 | Score: 2.0 (Low) |
563 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150 | 563 | Description: The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them. |
564 | 564 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103 | |
565 | CVE name: CVE-2016-10147 | 565 | |
566 | Package: Kernel | 566 | CVE-2016-9102 |
567 | Score: 5.0 (Medium) | 567 | Package: Qemu |
568 | Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). | 568 | Score: 2.0 (Low) |
569 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147 | 569 | Description: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number. |
570 | 570 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102 | |
571 | CVE name: CVE-2016-10124 | 571 | |
572 | Package: LXC | 572 | CVE-2016-9083 |
573 | Score: 5.0 (Medium) | 573 | Package: Kernel |
574 | Description: An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container. | 574 | Score: 8.0 (High) |
575 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124 | 575 | Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug." |
576 | 576 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083 | |
577 | CVE name: CVE-2016-10087 | 577 | |
578 | Package: Libpng | 578 | CVE-2016-8910 |
579 | Score: 5.0 (Medium) | 579 | Package: Qemu |
580 | Description: The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. | 580 | Score: 2.0 (Low) |
581 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087 | 581 | Description: The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count. |
582 | 582 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910 | |
583 | CVE name: CVE-2016-10044 | 583 | |
584 | Package: Kernel | 584 | CVE-2016-8909 |
585 | Score: 7.0 (High) | 585 | Package: Qemu |
586 | Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. | 586 | Score: 2.0 (Low) |
587 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044 | 587 | Description: The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position. |
588 | 588 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909 | |
589 | CVE name: CVE-2016-10029 | 589 | |
590 | Package: Qemu | 590 | CVE-2016-8864 |
591 | Score: 2.0 (Low) | 591 | Package: bind |
592 | Description: The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts. | 592 | Score: 5.0 (Medium) |
593 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029 | 593 | Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c. |
594 | 594 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864 | |
595 | CVE name: CVE-2016-9923 | 595 | |
596 | Package: Qemu | 596 | CVE-2016-8858 |
597 | Score: 2.0 (Low) | 597 | Package: OpenSSL |
598 | Description: Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS. | 598 | Score: 7.8 (High) |
599 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923 | 599 | Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server’s memory. |
600 | 600 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858 | |
601 | CVE name: CVE-2016-9921 | 601 | |
602 | Package: Qemu | 602 | CVE-2016-8669 |
603 | Score: 2.0 (Low) | 603 | Package: Qemu |
604 | Description: Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS. | 604 | Score: 2.0 (Low) |
605 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921 | 605 | Description: The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. |
606 | 606 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669 | |
607 | CVE name: CVE-2016-9916 | 607 | |
608 | Package: Qemu | 608 | CVE-2016-8668 |
609 | Score: 5.0 (Medium) | 609 | Package: Qemu |
610 | Description: Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend. | 610 | Score: 2.0 (Low) |
611 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916 | 611 | Description: The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size. |
612 | 612 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668 | |
613 | CVE name: CVE-2016-9915 | 613 | |
614 | Package: Qemu | 614 | CVE-2016-8655 |
615 | Score: 5.0 (Medium) | 615 | Package: Kernel |
616 | Description: Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend. | 616 | Score: 8.0 (High) |
617 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915 | 617 | Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. |
618 | 618 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655 | |
619 | CVE name: CVE-2016-9914 | 619 | |
620 | Package: Qemu | 620 | CVE-2016-8649 |
621 | Score: 5.0 (Medium) | 621 | Package: lxc |
622 | Description: Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations. | 622 | Score: 9.0 (High) |
623 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914 | 623 | Description: lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls. |
624 | 624 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649 | |
625 | CVE name: CVE-2016-9913 | 625 | |
626 | Package: Qemu | 626 | CVE-2016-8625 |
627 | Score: 5.0 (Medium) | 627 | Package: curl |
628 | Description: Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup. | 628 | Score: 6.9 (Medium) |
629 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913 | 629 | Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German ßcharacter (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `straße.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn. |
630 | 630 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625 | |
631 | CVE name: CVE-2016-9912 | 631 | |
632 | Package: Qemu | 632 | CVE-2016-8624 |
633 | Score: 2.0 (Low) | 633 | Package: curl |
634 | Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. | 634 | Score: 6.9 (Medium) |
635 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912 | 635 | Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes. |
636 | 636 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 | |
637 | CVE name: CVE-2016-9911 | 637 | |
638 | Package: Qemu | 638 | CVE-2016-8623 |
639 | Score: 2.0 (Low) | 639 | Package: curl |
640 | Description: Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. | 640 | Score: 4.9 (Medium) |
641 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911 | 641 | Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls. |
642 | 642 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 | |
643 | CVE name: CVE-2016-9908 | 643 | |
644 | Package: Qemu | 644 | CVE-2016-8622 |
645 | Score: 2.0 (Low) | 645 | Package: curl |
646 | Description: Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes. | 646 | Score: 4.9 (Medium) |
647 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908 | 647 | Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program. |
648 | 648 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 | |
649 | CVE name: CVE-2016-9907 | 649 | |
650 | Package: Qemu | 650 | CVE-2016-8621 |
651 | Score: 2.0 (Low) | 651 | Package: curl |
652 | Description: Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host. | 652 | Score: 4.9 (Medium) |
653 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907 | 653 | Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds. |
654 | 654 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 | |
655 | CVE name: CVE-2016-9846 | 655 | |
656 | Package: Qemu | 656 | CVE-2016-8620 |
657 | Score: 5.0 (Medium) | 657 | Package: curl |
658 | Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host. | 658 | Score: 6.9 (Medium) |
659 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846 | 659 | Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer. |
660 | 660 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620 | |
661 | CVE name: CVE-2016-9845 | 661 | |
662 | Package: Qemu | 662 | CVE-2016-8619 |
663 | Score: 0.0 (Low) | 663 | Package: curl |
664 | Description: QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes. | 664 | Score: 6.9 (Medium) |
665 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845 | 665 | Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver. |
666 | 666 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 | |
667 | CVE name: CVE-2016-9844 | 667 | |
668 | Package: unzip | 668 | CVE-2016-8618 |
669 | Score: 2.1 (Low) | 669 | Package: curl |
670 | Description: Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header. | 670 | Score: 6.9 (Medium) |
671 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844 | 671 | Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function. |
672 | 672 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 | |
673 | CVE name: CVE-2016-9776 | 673 | |
674 | Package: Qemu | 674 | CVE-2016-8617 |
675 | Score: 2.0 (Low) | 675 | Package: curl |
676 | Description: QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS. | 676 | Score: 6.9 (Medium) |
677 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776 | 677 | Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue. |
678 | 678 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 | |
679 | CVE name: CVE-2016-9754 | 679 | |
680 | Package: Kernel | 680 | CVE-2016-8616 |
681 | Score: 7.0 (High) | 681 | Package: curl |
682 | Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file. | 682 | Score: 3.9 (Low) |
683 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754 | 683 | Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw. |
684 | 684 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 | |
685 | CVE name: CVE-2016-9603 | 685 | |
686 | Package: Qemu | 686 | CVE-2016-8615 |
687 | Score: 8.0 (High) | 687 | Package: curl |
688 | Description: A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. | 688 | Score: 6.9 (Medium) |
689 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603 | 689 | Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw. |
690 | 690 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 | |
691 | CVE name: CVE-2016-9540 | 691 | |
692 | Package: tiff | 692 | CVE-2016-8578 |
693 | Score: 7.5 (High) | 693 | Package: Qemu |
694 | Description: tools/tiffcp.c in libtiff 4.0.6 has an out-of-bounds write on tiled images with odd tile width versus image width. Reported as MSVR 35103, aka "cpStripToTile heap-buffer-overflow." | 694 | Score: 2.0 (Low) |
695 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540 | 695 | Description: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation. |
696 | 696 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578 | |
697 | CVE name: CVE-2016-9539 | 697 | |
698 | Package: tiff | 698 | CVE-2016-8577 |
699 | Score: 7.5 (High) | 699 | Package: Qemu |
700 | Description: tools/tiffcrop.c in libtiff 4.0.6 has an out-of-bounds read in readContigTilesIntoBuffer(). Reported as MSVR 35092. | 700 | Score: 2.0 (Low) |
701 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9539 | 701 | Description: Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. |
702 | 702 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577 | |
703 | CVE name: CVE-2016-9538 | 703 | |
704 | Package: tiff | 704 | CVE-2016-8576 |
705 | Score: 7.5 (High) | 705 | Package: Qemu |
706 | Description: tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100. | 706 | Score: 2.0 (Low) |
707 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538 | 707 | Description: The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process. |
708 | 708 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576 | |
709 | CVE name: CVE-2016-9537 | 709 | |
710 | Package: tiff | 710 | CVE-2016-7995 |
711 | Score: 7.5 (High) | 711 | Package: Qemu |
712 | Description: tools/tiffcrop.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in buffers. Reported as MSVR 35093, MSVR 35096, and MSVR 35097. | 712 | Score: 2.0 (Low) |
713 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537 | 713 | Description: Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. |
714 | 714 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995 | |
715 | CVE name: CVE-2016-9536 | 715 | |
716 | Package: tiff | 716 | CVE-2016-7994 |
717 | Score: 7.5 (High) | 717 | Package: Qemu |
718 | Description: tools/tiff2pdf.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers in t2p_process_jpeg_strip(). Reported as MSVR 35098, aka "t2p_process_jpeg_strip heap-buffer-overflow." | 718 | Score: 2.0 (Low) |
719 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536 | 719 | Description: Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands. |
720 | 720 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994 | |
721 | CVE name: CVE-2016-9535 | 721 | |
722 | Package: tiff | 722 | CVE-2016-7909 |
723 | Score: 7.5 (High) | 723 | Package: Qemu |
724 | Description: tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow." | 724 | Score: 5.0 (Medium) |
725 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535 | 725 | Description: The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0. |
726 | 726 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909 | |
727 | CVE name: CVE-2016-9534 | 727 | |
728 | Package: tiff | 728 | CVE-2016-7908 |
729 | Score: 7.5 (High) | 729 | Package: Qemu |
730 | Description: tif_write.c in libtiff 4.0.6 has an issue in the error code path of TIFFFlushData1() that didn't reset the tif_rawcc and tif_rawcp members. Reported as MSVR 35095, aka "TIFFFlushData1 heap-buffer-overflow." | 730 | Score: 2.0 (Low) |
731 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534 | 731 | Description: The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags. |
732 | 732 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908 | |
733 | CVE name: CVE-2016-9533 | 733 | |
734 | Package: tiff | 734 | CVE-2016-7795 |
735 | Score: 7.5 (High) | 735 | Package: systemd |
736 | Description: tif_pixarlog.c in libtiff 4.0.6 has out-of-bounds write vulnerabilities in heap allocated buffers. Reported as MSVR 35094, aka "PixarLog horizontalDifference heap-buffer-overflow." | 736 | Score: 4.9 (Medium) |
737 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533 | 737 | Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. |
738 | 738 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795 | |
739 | CVE name: CVE-2016-9448 | 739 | |
740 | Package: tiff | 740 | CVE-2016-7466 |
741 | Score: 5.0 (Medium) | 741 | Package: Qemu |
742 | Description: The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297. | 742 | Score: 2.0 (Low) |
743 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448 | 743 | Description: Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. |
744 | 744 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466 | |
745 | CVE name: CVE-2016-9444 | 745 | |
746 | Package: bind | 746 | CVE-2016-7423 |
747 | Score: 7.0 (High) | 747 | Package: Qemu |
748 | Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer. | 748 | Score: 2.0 (Low) |
749 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444 | 749 | Description: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects. |
750 | 750 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423 | |
751 | CVE name: CVE-2016-9401 | 751 | |
752 | Package: bash | 752 | CVE-2016-7422 |
753 | Score: 2.0 (Low) | 753 | Package: Qemu |
754 | Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6 | 754 | Score: 2.0 (Low) |
755 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401 | 755 | Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value. |
756 | 756 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422 | |
757 | CVE name: CVE-2016-9318 | 757 | |
758 | Package: libxml2-native | 758 | CVE-2016-7421 |
759 | Score: 6.8 (Medium) | 759 | Package: Qemu |
760 | Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. | 760 | Score: 2.0 (Low) |
761 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 | 761 | Description: The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size. |
762 | 762 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421 | |
763 | CVE name: CVE-2016-9297 | 763 | |
764 | Package: tiff | 764 | CVE-2016-7170 |
765 | Score: 5.0 (Medium) | 765 | Package: Qemu |
766 | Description: The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values. | 766 | Score: 2.0 (Low) |
767 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297 | 767 | Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. |
768 | 768 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170 | |
769 | CVE name: CVE-2016-9273 | 769 | |
770 | Package: tiff | 770 | CVE-2016-7157 |
771 | Score: 4.3 (Medium) | 771 | Package: Qemu |
772 | Description: tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode. | 772 | Score: 2.0 (Low) |
773 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273 | 773 | Description: The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK. |
774 | 774 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157 | |
775 | CVE name: CVE-2016-9106 | 775 | |
776 | Package: Qemu | 776 | CVE-2016-7156 |
777 | Score: 2.0 (Low) | 777 | Package: Qemu |
778 | Description: Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector. | 778 | Score: 2.0 (Low) |
779 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106 | 779 | Description: The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast. |
780 | 780 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156 | |
781 | CVE name: CVE-2016-9105 | 781 | |
782 | Package: Qemu | 782 | CVE-2016-7155 |
783 | Score: 2.0 (Low) | 783 | Package: Qemu |
784 | Description: Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object. | 784 | Score: 2.0 (Low) |
785 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105 | 785 | Description: hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings. |
786 | 786 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155 | |
787 | CVE name: CVE-2016-9104 | 787 | |
788 | Package: Qemu | 788 | CVE-2016-7116 |
789 | Score: 2.0 (Low) | 789 | Package: Qemu |
790 | Description: Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access. | 790 | Score: 2.0 (Low) |
791 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104 | 791 | Description: Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string. |
792 | 792 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116 | |
793 | CVE name: CVE-2016-9103 | 793 | |
794 | Package: Qemu | 794 | CVE-2016-7097 |
795 | Score: 2.0 (Low) | 795 | Package: Kernel |
796 | Description: The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them. | 796 | Score: 3.6 (Low) |
797 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103 | 797 | Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. |
798 | 798 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097 | |
799 | CVE name: CVE-2016-9102 | 799 | |
800 | Package: Qemu | 800 | CVE-2016-6888 |
801 | Score: 2.0 (Low) | 801 | Package: Qemu |
802 | Description: Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number. | 802 | Score: 2.0 (Low) |
803 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102 | 803 | Description: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. |
804 | 804 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888 | |
805 | CVE name: CVE-2016-9083 | 805 | |
806 | Package: Kernel | 806 | CVE-2016-6836 |
807 | Score: 8.0 (High) | 807 | Package: Qemu |
808 | Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug." | 808 | Score: 2.0 (Low) |
809 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083 | 809 | Description: The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object. |
810 | 810 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836 | |
811 | CVE name: CVE-2016-8910 | 811 | |
812 | Package: Qemu | 812 | CVE-2016-6835 |
813 | Score: 2.0 (Low) | 813 | Package: Qemu |
814 | Description: The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count. | 814 | Score: 2.0 (Low) |
815 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910 | 815 | Description: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. |
816 | 816 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835 | |
817 | CVE name: CVE-2016-8909 | 817 | |
818 | Package: Qemu | 818 | CVE-2016-6834 |
819 | Score: 2.0 (Low) | 819 | Package: Qemu |
820 | Description: The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position. | 820 | Score: 2.0 (Low) |
821 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909 | 821 | Description: The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length. |
822 | 822 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834 | |
823 | CVE name: CVE-2016-8864 | 823 | |
824 | Package: bind | 824 | CVE-2016-6833 |
825 | Score: 5.0 (Medium) | 825 | Package: Qemu |
826 | Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c. | 826 | Score: 2.0 (Low) |
827 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864 | 827 | Description: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active. |
828 | 828 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833 | |
829 | CVE name: CVE-2016-8858 | 829 | |
830 | Package: openssh | 830 | CVE-2016-6490 |
831 | Score: 7.8 (High) | 831 | Package: Qemu |
832 | Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server�s memory. | 832 | Score: 2.0 (Low) |
833 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858 | 833 | Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. |
834 | 834 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490 | |
835 | CVE name: CVE-2016-8669 | 835 | |
836 | Package: Qemu | 836 | CVE-2016-6489 |
837 | Score: 2.0 (Low) | 837 | Package: nettle |
838 | Description: The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base. | 838 | Score: 5.0 (Medium) |
839 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669 | 839 | Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack. |
840 | 840 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489 | |
841 | CVE name: CVE-2016-8668 | 841 | |
842 | Package: Qemu | 842 | CVE-2016-6480 |
843 | Score: 2.0 (Low) | 843 | Package: Kernel |
844 | Description: The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size. | 844 | Score: 4.7 (Medium) |
845 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668 | 845 | Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability. |
846 | 846 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480 | |
847 | CVE name: CVE-2016-8655 | 847 | |
848 | Package: Kernel | 848 | CVE-2016-6354 |
849 | Score: 8.0 (High) | 849 | Package: flex |
850 | Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. | 850 | Score: 7.5 (High) |
851 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655 | 851 | Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. |
852 | 852 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 | |
853 | CVE name: CVE-2016-8649 | 853 | |
854 | Package: lxc | 854 | CVE-2016-6351 |
855 | Score: 9.0 (High) | 855 | Package: Qemu |
856 | Description: lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls. | 856 | Score: 7.0 (High) |
857 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649 | 857 | Description: The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer. |
858 | 858 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351 | |
859 | CVE name: CVE-2016-8636 | 859 | |
860 | Package: Kernel | 860 | CVE-2016-6323 |
861 | Score: 7.0 (High) | 861 | Package: glibc |
862 | Description: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology. | 862 | Score: 5.0 (Medium) |
863 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636 | 863 | Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation. |
864 | 864 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 | |
865 | CVE name: CVE-2016-8630 | 865 | |
866 | Package: Kernel | 866 | CVE-2016-6321 |
867 | Score: 6.0 (Medium) | 867 | Package: Tar (Gnu) |
868 | Description: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction. | 868 | Score: 5.0 (Medium) |
869 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630 | 869 | Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. |
870 | 870 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 | |
871 | CVE name: CVE-2016-8625 | 871 | |
872 | Package: curl | 872 | CVE-2016-6318 |
873 | Score: 6.9 (Medium) | 873 | Package: cracklib |
874 | Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German �character (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `stra�e.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn. | 874 | Score: 7.5 (High) |
875 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625 | 875 | Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer. |
876 | 876 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 | |
877 | CVE name: CVE-2016-8624 | 877 | |
878 | Package: curl | 878 | CVE-2016-6301 |
879 | Score: 6.9 (Medium) | 879 | Package: busybox |
880 | Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes. | 880 | Score: 7.1 (High) |
881 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 | 881 | Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop. |
882 | 882 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301 | |
883 | CVE name: CVE-2016-8623 | 883 | |
884 | Package: curl | 884 | CVE-2016-6252 |
885 | Score: 4.9 (Medium) | 885 | Package: shadow |
886 | Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls. | 886 | Score: 5.0 (Medium) |
887 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 | 887 | Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff |
888 | 888 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 | |
889 | CVE name: CVE-2016-8622 | 889 | |
890 | Package: curl | 890 | CVE-2016-6185 |
891 | Score: 4.9 (Medium) | 891 | Package: Perl |
892 | Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program. | 892 | Score: 5.0 (Medium) |
893 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 | 893 | Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. |
894 | 894 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 | |
895 | CVE name: CVE-2016-8621 | 895 | |
896 | Package: curl | 896 | CVE-2016-6170 |
897 | Score: 4.9 (Medium) | 897 | Package: bind |
898 | Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds. | 898 | Score: 6.0 (Medium) |
899 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 | 899 | Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390 |
900 | 900 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170 | |
901 | CVE name: CVE-2016-8620 | 901 | |
902 | Package: curl | 902 | CVE-2016-6131 |
903 | Score: 6.9 (Medium) | 903 | Package: gcc |
904 | Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer. | 904 | Score: 4.9 (Medium) |
905 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620 | 905 | Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling. |
906 | 906 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131 | |
907 | CVE name: CVE-2016-8619 | 907 | |
908 | Package: curl | 908 | CVE-2016-5636 |
909 | Score: 6.9 (Medium) | 909 | Package: CPython |
910 | Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver. | 910 | Score: 10.0 (High) |
911 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 | 911 | Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. |
912 | 912 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 | |
913 | CVE name: CVE-2016-8618 | 913 | |
914 | Package: curl | 914 | CVE-2016-5403 |
915 | Score: 6.9 (Medium) | 915 | Package: Qemu |
916 | Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function. | 916 | Score: 5.0 (Medium) |
917 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 | 917 | Description: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion. |
918 | 918 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403 | |
919 | CVE name: CVE-2016-8617 | 919 | |
920 | Package: curl | 920 | CVE-2016-5338 |
921 | Score: 6.9 (Medium) | 921 | Package: Qemu |
922 | Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue. | 922 | Score: 5.0 (Medium) |
923 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 | 923 | Description: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer. |
924 | 924 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338 | |
925 | CVE name: CVE-2016-8616 | 925 | |
926 | Package: curl | 926 | CVE-2016-5337 |
927 | Score: 3.9 (Low) | 927 | Package: Qemu |
928 | Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw. | 928 | Score: 2.0 (Low) |
929 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 | 929 | Description: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. |
930 | 930 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337 | |
931 | CVE name: CVE-2016-8615 | 931 | |
932 | Package: curl | 932 | CVE-2016-5300 |
933 | Score: 6.9 (Medium) | 933 | Package: expat |
934 | Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw. | 934 | Score: 7.8 (High) |
935 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 | 935 | Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. |
936 | 936 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 | |
937 | CVE name: CVE-2016-8602 | 937 | |
938 | Package: Ghostscript | 938 | CVE-2016-5238 |
939 | Score: 6.8 (Medium) | 939 | Package: Qemu |
940 | Description: The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Postscript document that calls .sethalftone5 with an empty operand stack. | 940 | Score: 2.0 (Low) |
941 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602 | 941 | Description: The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode. |
942 | 942 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238 | |
943 | CVE name: CVE-2016-8578 | 943 | |
944 | Package: Qemu | 944 | CVE-2016-5131 |
945 | Score: 2.0 (Low) | 945 | Package: libxml2 |
946 | Description: The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation. | 946 | Score: 10.0 (High) |
947 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578 | 947 | Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. |
948 | 948 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 | |
949 | CVE name: CVE-2016-8577 | 949 | |
950 | Package: Qemu | 950 | CVE-2016-5126 |
951 | Score: 2.0 (Low) | 951 | Package: Qemu |
952 | Description: Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. | 952 | Score: 5.0 (Medium) |
953 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577 | 953 | Description: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. |
954 | 954 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126 | |
955 | CVE name: CVE-2016-8576 | 955 | |
956 | Package: Qemu | 956 | CVE-2016-5107 |
957 | Score: 2.0 (Low) | 957 | Package: Qemu |
958 | Description: The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process. | 958 | Score: 2.0 (Low) |
959 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576 | 959 | Description: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors. |
960 | 960 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107 | |
961 | CVE name: CVE-2016-7995 | 961 | |
962 | Package: Qemu | 962 | CVE-2016-5106 |
963 | Score: 2.0 (Low) | 963 | Package: Qemu |
964 | Description: Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes. | 964 | Score: 2.0 (Low) |
965 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995 | 965 | Description: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command. |
966 | 966 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106 | |
967 | CVE name: CVE-2016-7994 | 967 | |
968 | Package: Qemu | 968 | CVE-2016-5105 |
969 | Score: 2.0 (Low) | 969 | Package: Qemu |
970 | Description: Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands. | 970 | Score: 2.0 (Low) |
971 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994 | 971 | Description: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command. |
972 | 972 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105 | |
973 | CVE name: CVE-2016-7979 | 973 | |
974 | Package: ghostscript | 974 | CVE-2016-5008 |
975 | Score: 7.5 (High) | 975 | Package: libvirt |
976 | Description: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently execute arbitrary code by leveraging type confusion in .initialize_dsc_parser. | 976 | Score: 4.3 (Medium) |
977 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979 | 977 | Description: libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server. |
978 | 978 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008 | |
979 | CVE name: CVE-2016-7978 | 979 | |
980 | Package: ghostscript | 980 | CVE-2016-4964 |
981 | Score: 7.5 (High) | 981 | Package: Qemu |
982 | Description: Use-after-free vulnerability in Ghostscript 9.20 might allow remote attackers to execute arbitrary code via vectors related to a reference leak in .setdevice. | 982 | Score: 5.0 (Medium) |
983 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978 | 983 | Description: The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s->state. |
984 | 984 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964 | |
985 | CVE name: CVE-2016-7977 | 985 | |
986 | Package: ghostscript | 986 | CVE-2016-4952 |
987 | Score: 4.3 (Medium) | 987 | Package: Qemu |
988 | Description: Ghostscript before 9.21 might allow remote attackers to bypass the SAFER mode protection mechanism and consequently read arbitrary files via the use of the .libfile operator in a crafted postscript document. | 988 | Score: 2.0 (Low) |
989 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977 | 989 | Description: QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command. |
990 | 990 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952 | |
991 | CVE name: CVE-2016-7909 | 991 | |
992 | Package: Qemu | 992 | CVE-2016-4658 |
993 | Score: 5.0 (Medium) | 993 | Package: libxml2 |
994 | Description: The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0. | 994 | Score: 10.0 (High) |
995 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909 | 995 | Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. |
996 | 996 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 | |
997 | CVE name: CVE-2016-7908 | 997 | |
998 | Package: Qemu | 998 | CVE-2016-4454 |
999 | Score: 2.0 (Low) | 999 | Package: Qemu |
1000 | Description: The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags. | 1000 | Score: 3.0 (Low) |
1001 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908 | 1001 | Description: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read. |
1002 | 1002 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454 | |
1003 | CVE name: CVE-2016-7795 | 1003 | |
1004 | Package: systemd | 1004 | CVE-2016-4453 |
1005 | Score: 4.9 (Medium) | 1005 | Package: Qemu |
1006 | Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. | 1006 | Score: 5.0 (Medium) |
1007 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795 | 1007 | Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command. |
1008 | 1008 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453 | |
1009 | CVE name: CVE-2016-7466 | 1009 | |
1010 | Package: Qemu | 1010 | CVE-2016-4448 |
1011 | Score: 2.0 (Low) | 1011 | Package: libxml2 |
1012 | Description: Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. | 1012 | Score: 10.0 (High) |
1013 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466 | 1013 | Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. |
1014 | 1014 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 | |
1015 | CVE name: CVE-2016-7423 | 1015 | |
1016 | Package: Qemu | 1016 | CVE-2016-4441 |
1017 | Score: 2.0 (Low) | 1017 | Package: Qemu |
1018 | Description: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects. | 1018 | Score: 2.0 (Low) |
1019 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423 | 1019 | Description: The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command. |
1020 | 1020 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441 | |
1021 | CVE name: CVE-2016-7422 | 1021 | |
1022 | Package: Qemu | 1022 | CVE-2016-4439 |
1023 | Score: 2.0 (Low) | 1023 | Package: Qemu |
1024 | Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value. | 1024 | Score: 5.0 (Medium) |
1025 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422 | 1025 | Description: The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors. |
1026 | 1026 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439 | |
1027 | CVE name: CVE-2016-7421 | 1027 | |
1028 | Package: Qemu | 1028 | CVE-2016-4037 |
1029 | Score: 2.0 (Low) | 1029 | Package: Qemu |
1030 | Description: The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size. | 1030 | Score: 5.0 (Medium) |
1031 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421 | 1031 | Description: The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558. |
1032 | 1032 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037 | |
1033 | CVE name: CVE-2016-7170 | 1033 | |
1034 | Package: Qemu | 1034 | CVE-2016-4020 |
1035 | Score: 2.0 (Low) | 1035 | Package: Qemu |
1036 | Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. | 1036 | Score: 2.0 (Low) |
1037 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170 | 1037 | Description: The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR). |
1038 | 1038 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020 | |
1039 | CVE name: CVE-2016-7157 | 1039 | |
1040 | Package: Qemu | 1040 | CVE-2016-4002 |
1041 | Score: 2.0 (Low) | 1041 | Package: Qemu |
1042 | Description: The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK. | 1042 | Score: 7.0 (High) |
1043 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157 | 1043 | Description: Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes. |
1044 | 1044 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002 | |
1045 | CVE name: CVE-2016-7156 | 1045 | |
1046 | Package: Qemu | 1046 | CVE-2016-4001 |
1047 | Score: 2.0 (Low) | 1047 | Package: Qemu |
1048 | Description: The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast. | 1048 | Score: 4.0 (Medium) |
1049 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156 | 1049 | Description: Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet. |
1050 | 1050 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001 | |
1051 | CVE name: CVE-2016-7155 | 1051 | |
1052 | Package: Qemu | 1052 | CVE-2016-3712 |
1053 | Score: 2.0 (Low) | 1053 | Package: Qemu |
1054 | Description: hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings. | 1054 | Score: 2.0 (Low) |
1055 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155 | 1055 | Description: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode. |
1056 | 1056 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712 | |
1057 | CVE name: CVE-2016-7116 | 1057 | |
1058 | Package: Qemu | 1058 | CVE-2016-3710 |
1059 | Score: 2.0 (Low) | 1059 | Package: Qemu |
1060 | Description: Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string. | 1060 | Score: 7.0 (High) |
1061 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116 | 1061 | Description: The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue. |
1062 | 1062 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710 | |
1063 | CVE name: CVE-2016-7097 | 1063 | |
1064 | Package: Kernel | 1064 | CVE-2016-2858 |
1065 | Score: 3.6 (Low) | 1065 | Package: Qemu |
1066 | Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. | 1066 | Score: 2.0 (Low) |
1067 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097 | 1067 | Description: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption. |
1068 | 1068 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858 | |
1069 | CVE name: CVE-2016-6888 | 1069 | |
1070 | Package: Qemu | 1070 | CVE-2016-2857 |
1071 | Score: 2.0 (Low) | 1071 | Package: Qemu |
1072 | Description: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference. | 1072 | Score: 2.0 (Low) |
1073 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888 | 1073 | Description: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. |
1074 | 1074 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857 | |
1075 | CVE name: CVE-2016-6836 | 1075 | |
1076 | Package: Qemu | 1076 | CVE-2016-2775 |
1077 | Score: 2.0 (Low) | 1077 | Package: bind |
1078 | Description: The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object. | 1078 | Score: 4.3 (Medium) |
1079 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836 | 1079 | Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. |
1080 | 1080 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775 | |
1081 | CVE name: CVE-2016-6835 | 1081 | |
1082 | Package: Qemu | 1082 | CVE-2016-2391 |
1083 | Score: 2.0 (Low) | 1083 | Package: Qemu |
1084 | Description: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | 1084 | Score: 2.0 (Low) |
1085 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835 | 1085 | Description: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers. |
1086 | 1086 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391 | |
1087 | CVE name: CVE-2016-6834 | 1087 | |
1088 | Package: Qemu | 1088 | CVE-2016-2381 |
1089 | Score: 2.0 (Low) | 1089 | Package: Perl |
1090 | Description: The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length. | 1090 | Score: 5.0 (Medium) |
1091 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834 | 1091 | Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. |
1092 | 1092 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 | |
1093 | CVE name: CVE-2016-6833 | 1093 | |
1094 | Package: Qemu | 1094 | CVE-2016-2183 |
1095 | Score: 2.0 (Low) | 1095 | Package: OpenSSL |
1096 | Description: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active. | 1096 | Score: 5.0 (Medium) |
1097 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833 | 1097 | Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. |
1098 | 1098 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 | |
1099 | CVE name: CVE-2016-6490 | 1099 | |
1100 | Package: Qemu | 1100 | CVE-2016-2147 |
1101 | Score: 2.0 (Low) | 1101 | Package: busybox |
1102 | Description: The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. | 1102 | Score: 5.0 (Medium) |
1103 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490 | 1103 | Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write. |
1104 | 1104 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147 | |
1105 | CVE name: CVE-2016-6489 | 1105 | |
1106 | Package: nettle | 1106 | CVE-2016-1568 |
1107 | Score: 5.0 (Medium) | 1107 | Package: Qemu |
1108 | Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack. | 1108 | Score: 9.0 (High) |
1109 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489 | 1109 | Description: Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command. |
1110 | 1110 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568 | |
1111 | CVE name: CVE-2016-6480 | 1111 | |
1112 | Package: Kernel | 1112 | CVE-2016-1238 |
1113 | Score: 4.7 (Medium) | 1113 | Package: Qemu |
1114 | Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability. | 1114 | Score: 7.0 (High) |
1115 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480 | 1115 | Description: (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory. |
1116 | 1116 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 | |
1117 | CVE name: CVE-2016-6354 | 1117 | |
1118 | Package: flex | 1118 | CVE-2016-10229 |
1119 | Score: 7.5 (High) | 1119 | Package: kernel |
1120 | Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. | 1120 | Score: 10.0 (High) |
1121 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 | 1121 | Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag. |
1122 | 1122 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229 | |
1123 | CVE name: CVE-2016-6351 | 1123 | |
1124 | Package: Qemu | 1124 | CVE-2016-10208 |
1125 | Score: 7.0 (High) | 1125 | Package: Kernel |
1126 | Description: The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer. | 1126 | Score: 5.0 (Medium) |
1127 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351 | 1127 | Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image. |
1128 | 1128 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208 | |
1129 | CVE name: CVE-2016-6323 | 1129 | |
1130 | Package: glibc | 1130 | CVE-2016-10154 |
1131 | Score: 5.0 (Medium) | 1131 | Package: Kernel |
1132 | Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation. | 1132 | Score: 5.0 (Medium) |
1133 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 | 1133 | Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist. |
1134 | 1134 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154 | |
1135 | CVE name: CVE-2016-6321 | 1135 | |
1136 | Package: Tar (Gnu) | 1136 | CVE-2016-10150 |
1137 | Score: 5.0 (Medium) | 1137 | Package: KVM |
1138 | Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. | 1138 | Score: 10.0 (High) |
1139 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 | 1139 | Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device. |
1140 | 1140 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150 | |
1141 | CVE name: CVE-2016-6318 | 1141 | |
1142 | Package: cracklib | 1142 | CVE-2016-10147 |
1143 | Score: 7.5 (High) | 1143 | Package: Kernel |
1144 | Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer. | 1144 | Score: 5.0 (Medium) |
1145 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 | 1145 | Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). |
1146 | 1146 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147 | |
1147 | CVE name: CVE-2016-6301 | 1147 | |
1148 | Package: busybox | 1148 | CVE-2016-10124 |
1149 | Score: 7.1 (High) | 1149 | Package: LXC |
1150 | Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop. | 1150 | Score: 5.0 (Medium) |
1151 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301 | 1151 | Description: An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container. |
1152 | 1152 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10124 | |
1153 | CVE name: CVE-2016-6252 | 1153 | |
1154 | Package: shadow | 1154 | CVE-2016-10087 |
1155 | Score: 5.0 (Medium) | 1155 | Package: Libpng |
1156 | Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff | 1156 | Score: 5.0 (Medium) |
1157 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 | 1157 | Description: The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure. |
1158 | 1158 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087 | |
1159 | CVE name: CVE-2016-6185 | 1159 | |
1160 | Package: Perl | 1160 | CVE-2016-10044 |
1161 | Score: 5.0 (Medium) | 1161 | Package: Kernel |
1162 | Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. | 1162 | Score: 7.0 (High) |
1163 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 | 1163 | Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. |
1164 | 1164 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044 | |
1165 | CVE name: CVE-2016-6170 | 1165 | |
1166 | Package: bind | 1166 | CVE-2016-10029 |
1167 | Score: 6.0 (Medium) | 1167 | Package: Qemu |
1168 | Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390 | 1168 | Score: 2.0 (Low) |
1169 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170 | 1169 | Description: The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts. |
1170 | 1170 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029 | |
1171 | CVE name: CVE-2016-6131 | 1171 | |
1172 | Package: gcc | 1172 | CVE-2016-0800 |
1173 | Score: 4.9 (Medium) | 1173 | Package: OpenSSL |
1174 | Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling. | 1174 | Score: 4.3 (Medium) |
1175 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131 | 1175 | Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. |
1176 | 1176 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800 | |
1177 | CVE name: CVE-2016-5875 | 1177 | |
1178 | Package: libtiff | 1178 | CVE-2016-0718 |
1179 | Score: 8.0 (High) | 1179 | Package: expat |
1180 | Description: An exploitable heap based buffer overflow exists in the handling of compressed TIFF images in LibTIFF�s PixarLogDecode api. A crafted TIFF document can lead to a heap based buffer overflow resulting in remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality. | 1180 | Score: 7.5 (High) |
1181 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875 | 1181 | Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. |
1182 | 1182 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 | |
1183 | CVE name: CVE-2016-5652 | 1183 | |
1184 | Package: tiff | 1184 | CVE-2016-0634 |
1185 | Score: 6.8 (Medium) | 1185 | Package: bash |
1186 | Description: An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means. | 1186 | Score: 5.0 (Medium) |
1187 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652 | 1187 | Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. |
1188 | 1188 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634 | |
1189 | CVE name: CVE-2016-5636 | 1189 | |
1190 | Package: CPython | 1190 | CVE-2015-8666 |
1191 | Score: 10.0 (High) | 1191 | Package: Qemu |
1192 | Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. | 1192 | Score: 1.9 (Low) |
1193 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 | 1193 | Description: Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator. |
1194 | 1194 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666 | |
1195 | CVE name: CVE-2016-5403 | 1195 | |
1196 | Package: Qemu | 1196 | CVE-2015-8613 |
1197 | Score: 5.0 (Medium) | 1197 | Package: Qemu |
1198 | Description: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion. | 1198 | Score: 1.9 (Low) |
1199 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403 | 1199 | Description: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command. |
1200 | 1200 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613 | |
1201 | CVE name: CVE-2016-5338 | 1201 | |
1202 | Package: Qemu | 1202 | CVE-2015-8568 |
1203 | Score: 5.0 (Medium) | 1203 | Package: Qemu |
1204 | Description: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer. | 1204 | Score: 4.7 (Medium) |
1205 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338 | 1205 | Description: Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly. |
1206 | 1206 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568 | |
1207 | CVE name: CVE-2016-5337 | 1207 | |
1208 | Package: Qemu | 1208 | CVE-2015-8567 |
1209 | Score: 2.0 (Low) | 1209 | Package: Qemu |
1210 | Description: The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. | 1210 | Score: 6.8 (Medium) |
1211 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337 | 1211 | Description: Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption). |
1212 | 1212 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567 | |
1213 | CVE name: CVE-2016-5300 | 1213 | |
1214 | Package: expat | 1214 | CVE-2015-8558 |
1215 | Score: 7.8 (High) | 1215 | Package: Qemu |
1216 | Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. | 1216 | Score: 5.0 (Medium) |
1217 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 | 1217 | Description: The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list. |
1218 | 1218 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558 | |
1219 | CVE name: CVE-2016-5238 | 1219 | |
1220 | Package: Qemu | 1220 | CVE-2015-7512 |
1221 | Score: 2.0 (Low) | 1221 | Package: Qemu |
1222 | Description: The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode. | 1222 | Score: 7.0 (High) |
1223 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238 | 1223 | Description: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. |
1224 | 1224 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512 | |
1225 | CVE name: CVE-2016-5131 | 1225 | |
1226 | Package: libxml2 | 1226 | CVE-2015-7295 |
1227 | Score: 10.0 (High) | 1227 | Package: Qemu |
1228 | Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. | 1228 | Score: 5.0 (Medium) |
1229 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 | 1229 | Description: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface. |
1230 | 1230 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295 | |
1231 | CVE name: CVE-2016-5126 | 1231 | |
1232 | Package: Qemu | 1232 | CVE-2015-6855 |
1233 | Score: 5.0 (Medium) | 1233 | Package: Qemu |
1234 | Description: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. | 1234 | Score: 10.0 (High) |
1235 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126 | 1235 | Description: hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash. |
1236 | 1236 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855 | |
1237 | CVE name: CVE-2016-5107 | 1237 | |
1238 | Package: Qemu | 1238 | CVE-2015-5224 |
1239 | Score: 2.0 (Low) | 1239 | Package: util-linux |
1240 | Description: The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors. | 1240 | Score: 7.5 (High) |
1241 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107 | 1241 | Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. |
1242 | 1242 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224 | |
1243 | CVE name: CVE-2016-5106 | 1243 | |
1244 | Package: Qemu | 1244 | CVE-2015-5158 |
1245 | Score: 2.0 (Low) | 1245 | Package: Qemu |
1246 | Description: The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command. | 1246 | Score: 4.0 (Medium) |
1247 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106 | 1247 | Description: Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block. |
1248 | 1248 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158 | |
1249 | CVE name: CVE-2016-5105 | 1249 | |
1250 | Package: Qemu | 1250 | CVE-2015-4106 |
1251 | Score: 2.0 (Low) | 1251 | Package: Qemu |
1252 | Description: The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command. | 1252 | Score: 7.0 (High) |
1253 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105 | 1253 | Description: QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors. |
1254 | 1254 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106 | |
1255 | CVE name: CVE-2016-5008 | 1255 | |
1256 | Package: libvirt | 1256 | CVE-2015-3209 |
1257 | Score: 4.3 (Medium) | 1257 | Package: Qemu |
1258 | Description: libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server. | 1258 | Score: 8.0 (High) |
1259 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008 | 1259 | Description: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. |
1260 | 1260 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209 | |
1261 | CVE name: CVE-2016-4964 | 1261 | |
1262 | Package: Qemu | 1262 | CVE-2015-1779 |
1263 | Score: 5.0 (Medium) | 1263 | Package: Qemu |
1264 | Description: The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s->state. | 1264 | Score: 8.0 (High) |
1265 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964 | 1265 | Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section. |
1266 | 1266 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 | |
1267 | CVE name: CVE-2016-4952 | 1267 | |
1268 | Package: Qemu | 1268 | CVE-2014-9365 |
1269 | Score: 2.0 (Low) | 1269 | Package: python |
1270 | Description: QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command. | 1270 | Score: 5.8 (Medium) |
1271 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952 | 1271 | Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
1272 | 1272 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365 | |
1273 | CVE name: CVE-2016-4658 | 1273 | |
1274 | Package: libxml2 | 1274 | CVE-2014-7840 |
1275 | Score: 10.0 (High) | 1275 | Package: Qemu |
1276 | Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. | 1276 | Score: 8.0 (High) |
1277 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 | 1277 | Description: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data. |
1278 | 1278 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840 | |
1279 | CVE name: CVE-2016-4454 | 1279 | |
1280 | Package: Qemu | 1280 | CVE-2014-5388 |
1281 | Score: 3.0 (Low) | 1281 | Package: Qemu |
1282 | Description: The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read. | 1282 | Score: 5.0 (Medium) |
1283 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454 | 1283 | Description: Off-by-one error in the pci_read function in the ACPI PCI hotplug interface (hw/acpi/pcihp.c) in QEMU allows local guest users to obtain sensitive information and have other unspecified impact related to a crafted PCI device that triggers memory corruption. |
1284 | 1284 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5388 | |
1285 | CVE name: CVE-2016-4453 | 1285 | |
1286 | Package: Qemu | 1286 | CVE-2014-3615 |
1287 | Score: 5.0 (Medium) | 1287 | Package: Qemu |
1288 | Description: The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command. | 1288 | Score: 2.0 (Low) |
1289 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453 | 1289 | Description: The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution. |
1290 | 1290 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615 | |
1291 | CVE name: CVE-2016-4448 | 1291 | |
1292 | Package: libxml2 | 1292 | CVE-2009-0590 |
1293 | Score: 10.0 (High) | 1293 | Package: OpenSSL |
1294 | Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. | 1294 | Score: 5.0 (Medium) |
1295 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 | 1295 | Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. |
1296 | 1296 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590 | |
1297 | CVE name: CVE-2016-4441 | 1297 | |
1298 | Package: Qemu | ||
1299 | Score: 2.0 (Low) | ||
1300 | Description: The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command. | ||
1301 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441 | ||
1302 | |||
1303 | CVE name: CVE-2016-4439 | ||
1304 | Package: Qemu | ||
1305 | Score: 5.0 (Medium) | ||
1306 | Description: The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors. | ||
1307 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439 | ||
1308 | |||
1309 | CVE name: CVE-2016-4037 | ||
1310 | Package: Qemu | ||
1311 | Score: 5.0 (Medium) | ||
1312 | Description: The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558. | ||
1313 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037 | ||
1314 | |||
1315 | CVE name: CVE-2016-4020 | ||
1316 | Package: Qemu | ||
1317 | Score: 2.0 (Low) | ||
1318 | Description: The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR). | ||
1319 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020 | ||
1320 | |||
1321 | CVE name: CVE-2016-4002 | ||
1322 | Package: Qemu | ||
1323 | Score: 7.0 (High) | ||
1324 | Description: Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes. | ||
1325 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002 | ||
1326 | |||
1327 | CVE name: CVE-2016-4001 | ||
1328 | Package: Qemu | ||
1329 | Score: 4.0 (Medium) | ||
1330 | Description: Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet. | ||
1331 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001 | ||
1332 | |||
1333 | CVE name: CVE-2016-3991 | ||
1334 | Package: tiff | ||
1335 | Score: 6.8 (Medium) | ||
1336 | Description: Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles. | ||
1337 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991 | ||
1338 | |||
1339 | CVE name: CVE-2016-3990 | ||
1340 | Package: tiff | ||
1341 | Score: 6.8 (Medium) | ||
1342 | Description: Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp. | ||
1343 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990 | ||
1344 | |||
1345 | CVE name: CVE-2016-3945 | ||
1346 | Package: tiff | ||
1347 | Score: 6.8 (Medium) | ||
1348 | Description: Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write. | ||
1349 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945 | ||
1350 | |||
1351 | CVE name: CVE-2016-3712 | ||
1352 | Package: Qemu | ||
1353 | Score: 2.0 (Low) | ||
1354 | Description: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode. | ||
1355 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712 | ||
1356 | |||
1357 | CVE name: CVE-2016-3710 | ||
1358 | Package: Qemu | ||
1359 | Score: 7.0 (High) | ||
1360 | Description: The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the \"Dark Portal\" issue. | ||
1361 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710 | ||
1362 | |||
1363 | CVE name: CVE-2016-3658 | ||
1364 | Package: tiff | ||
1365 | Score: 5.0 (Medium) | ||
1366 | Description: The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable. | ||
1367 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658 | ||
1368 | |||
1369 | CVE name: CVE-2016-3632 | ||
1370 | Package: tiff | ||
1371 | Score: 6.0 (Medium) | ||
1372 | Description: Out-of-bounds write vulnerability was found in _TIFFVGetField function in tif_dirinfo.c, allowing attacker to cause a denial of service or command execution via a crafted TIFF image. | ||
1373 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632 | ||
1374 | |||
1375 | CVE name: CVE-2016-3623 | ||
1376 | Package: tiff | ||
1377 | Score: 5.0 (Medium) | ||
1378 | Description: The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0. | ||
1379 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623 | ||
1380 | |||
1381 | CVE name: CVE-2016-3622 | ||
1382 | Package: tiff | ||
1383 | Score: 4.3 (Medium) | ||
1384 | Description: The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image. | ||
1385 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622 | ||
1386 | |||
1387 | CVE name: CVE-2016-2858 | ||
1388 | Package: Qemu | ||
1389 | Score: 2.0 (Low) | ||
1390 | Description: QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption. | ||
1391 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858 | ||
1392 | |||
1393 | CVE name: CVE-2016-2857 | ||
1394 | Package: Qemu | ||
1395 | Score: 2.0 (Low) | ||
1396 | Description: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. | ||
1397 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857 | ||
1398 | |||
1399 | CVE name: CVE-2016-2775 | ||
1400 | Package: bind | ||
1401 | Score: 4.3 (Medium) | ||
1402 | Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. | ||
1403 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775 | ||
1404 | |||
1405 | CVE name: CVE-2016-2391 | ||
1406 | Package: Qemu | ||
1407 | Score: 2.0 (Low) | ||
1408 | Description: The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers. | ||
1409 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391 | ||
1410 | |||
1411 | CVE name: CVE-2016-2381 | ||
1412 | Package: Perl | ||
1413 | Score: 5.0 (Medium) | ||
1414 | Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. | ||
1415 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 | ||
1416 | |||
1417 | CVE name: CVE-2016-2183 | ||
1418 | Package: OpenSSL | ||
1419 | Score: 5.0 (Medium) | ||
1420 | Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | ||
1421 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 | ||
1422 | |||
1423 | CVE name: CVE-2016-2147 | ||
1424 | Package: busybox | ||
1425 | Score: 5.0 (Medium) | ||
1426 | Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write. | ||
1427 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147 | ||
1428 | |||
1429 | CVE name: CVE-2016-1568 | ||
1430 | Package: Qemu | ||
1431 | Score: 9.0 (High) | ||
1432 | Description: Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command. | ||
1433 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568 | ||
1434 | |||
1435 | CVE name: CVE-2016-1238 | ||
1436 | Package: Qemu | ||
1437 | Score: 7.0 (High) | ||
1438 | Description: (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory. | ||
1439 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 | ||
1440 | |||
1441 | CVE name: CVE-2016-0800 | ||
1442 | Package: OpenSSL | ||
1443 | Score: 4.3 (Medium) | ||
1444 | Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | ||
1445 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800 | ||
1446 | |||
1447 | CVE name: CVE-2016-0718 | ||
1448 | Package: expat | ||
1449 | Score: 7.5 (High) | ||
1450 | Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. | ||
1451 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 | ||
1452 | |||
1453 | CVE name: CVE-2016-0634 | ||
1454 | Package: Bash | ||
1455 | Score: 5.0 (Medium) | ||
1456 | Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. | ||
1457 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634 | ||
1458 | |||
1459 | CVE name: CVE-2015-9019 | ||
1460 | Package: libxslt-native | ||
1461 | Score: 5.0 (Medium) | ||
1462 | Description: In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs | ||
1463 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019 | ||
1464 | |||
1465 | CVE name: CVE-2015-8666 | ||
1466 | Package: Qemu | ||
1467 | Score: 1.9 (Low) | ||
1468 | Description: Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator. | ||
1469 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666 | ||
1470 | |||
1471 | CVE name: CVE-2015-8613 | ||
1472 | Package: Qemu | ||
1473 | Score: 1.9 (Low) | ||
1474 | Description: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command. | ||
1475 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613 | ||
1476 | |||
1477 | CVE name: CVE-2015-8568 | ||
1478 | Package: Qemu | ||
1479 | Score: 4.7 (Medium) | ||
1480 | Description: Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly. | ||
1481 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568 | ||
1482 | |||
1483 | CVE name: CVE-2015-8567 | ||
1484 | Package: Qemu | ||
1485 | Score: 6.8 (Medium) | ||
1486 | Description: Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption). | ||
1487 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567 | ||
1488 | |||
1489 | CVE name: CVE-2015-8558 | ||
1490 | Package: Qemu | ||
1491 | Score: 5.0 (Medium) | ||
1492 | Description: The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list. | ||
1493 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558 | ||
1494 | |||
1495 | CVE name: CVE-2015-7512 | ||
1496 | Package: Qemu | ||
1497 | Score: 7.0 (High) | ||
1498 | Description: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | ||
1499 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512 | ||
1500 | |||
1501 | CVE name: CVE-2015-7295 | ||
1502 | Package: Qemu | ||
1503 | Score: 5.0 (Medium) | ||
1504 | Description: hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface. | ||
1505 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295 | ||
1506 | |||
1507 | CVE name: CVE-2015-6855 | ||
1508 | Package: Qemu | ||
1509 | Score: 10.0 (High) | ||
1510 | Description: hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash. | ||
1511 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855 | ||
1512 | |||
1513 | CVE name: CVE-2015-5224 | ||
1514 | Package: util-linux | ||
1515 | Score: 7.5 (High) | ||
1516 | Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. | ||
1517 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224 | ||
1518 | |||
1519 | CVE name: CVE-2015-5158 | ||
1520 | Package: Qemu | ||
1521 | Score: 4.0 (Medium) | ||
1522 | Description: Stack-based buffer overflow in hw/scsi/scsi-bus.c in QEMU, when built with SCSI-device emulation support, allows guest OS users with CAP_SYS_RAWIO permissions to cause a denial of service (instance crash) via an invalid opcode in a SCSI command descriptor block. | ||
1523 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5158 | ||
1524 | |||
1525 | CVE name: CVE-2015-4106 | ||
1526 | Package: Qemu | ||
1527 | Score: 7.0 (High) | ||
1528 | Description: QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors. | ||
1529 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106 | ||
1530 | |||
1531 | CVE name: CVE-2015-3209 | ||
1532 | Package: Qemu | ||
1533 | Score: 8.0 (High) | ||
1534 | Description: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set. | ||
1535 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209 | ||
1536 | |||
1537 | CVE name: CVE-2015-1779 | ||
1538 | Package: Qemu | ||
1539 | Score: 8.0 (High) | ||
1540 | Description: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section. | ||
1541 | Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779 | ||