summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2018-02-22 09:27:40 +0100
committerSona Sarmadi <sona.sarmadi@enea.com>2018-02-22 09:27:40 +0100
commite9d286982ad56577e3cd9c2b545c867baafbd13e (patch)
tree76a1bbf863c6752c512cbf809b3f3541ecb27fde
parent5e2c06911ae9ad63b916baf77649a2d384075751 (diff)
downloadel_releases-standard-e9d286982ad56577e3cd9c2b545c867baafbd13e.tar.gz
Fixed CVEs which were not in right order.
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
-rw-r--r--doc/enea-linux-security-report2110
1 files changed, 1055 insertions, 1055 deletions
diff --git a/doc/enea-linux-security-report b/doc/enea-linux-security-report
index 72a8f34..60b4597 100644
--- a/doc/enea-linux-security-report
+++ b/doc/enea-linux-security-report
@@ -1,1055 +1,1055 @@
1CVE-i2017-1000380 1CVE-2017-1000380
2Package: kernel 2Package: kernel
3Score: 2.1 (Low) 3Score: 2.1 (Low)
4Description: sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time. 4Description: sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
5Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1000380 5Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
6 6
7CVE-2017-1000253 7CVE-2017-1000366
8Package: kernel 8Package: glibc
9Score: 8.0 (High) 9Score: 7.2 (High)
10Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 10Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE.
11Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253 11Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366
12 12
13CVE-2017-1000250 13CVE-2017-1000365
14Package: bluez5 14Package: kernel
15Score: 3.3 (Minor) 15Score: 7.2 (High)
16Description: All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests. 16Description: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
17Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250 17Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
18 18
19CVE-2017-13081 19CVE-2017-1000253
20Package: linux-firmware 20Package: kernel
21Score: 2.9 (Minor) 21Score: 8.0 (High)
22Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients. 22Description: A flaw was found in the way the Linux kernel loaded ELF executables. Provided that an application was built as Position Independent Executable (PIE), the loader could allow part of that application's data segment to map over the memory area reserved for its stack, potentially resulting in memory corruption. An unprivileged local user with access to SUID (or otherwise privileged) PIE binary could use this flaw to escalate their privileges on the system.Upstream patch:https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86
23Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081 23Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2017-1000253
24 24
25CVE-2017-13080 25CVE-2017-1000251
26Package: linux-firmware 26Package: kernel
27Score: 2.9 (Minor) 27Score: 8.3 (High)
28Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients. 28Description: The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
29Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080 29Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
30 30
31CVE-2017-9955 31CVE-2017-1000250
32Package: GNU Binutils 32Package: bluez5
33Score: 4.3 (Medium) 33Score: 3.3 (Minor)
34Description: The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program. 34Description: All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
35Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955 35Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250
36 36
37CVE-2017-9954 37CVE-2017-1000111
38Package: GNU Binutils 38Package: kernel
39Score: 4.3 (Medium) 39Score: 7.2 (High)
40Description: The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program. 40Description: Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
41Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954 41Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
42 42
43CVE-2017-9756 43CVE-2017-1000101
44Package: GNU Binutils 44Package: curl
45Score: 6.8 (Medium) 45Score: 4.0 (Medium)
46Description: The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 46Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing.
47Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756 47Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
48 48
49CVE-2017-9755 49CVE-2017-1000100
50Package: GNU Binutils (objdump) 50Package: curl
51Score: 6.8 (Medium) 51Score: 4.0 (Medium)
52Description: opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 52Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer.
53Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755 53Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
54 54
55CVE-2017-9753 55CVE-2017-1000082
56Package: GNU Binutils 56Package: systemd
57Score: 6.8 (Medium) 57Score: 10.0 (High)
58Description: The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 58Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
59Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753 59Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082
60 60
61CVE-2017-9752 61CVE-2017-18017
62Package: GNU Binutils, libbfd 62Package: kernel
63Score: 6.8 (Medium) 63Score: 5.0 (Medium)
64Description: bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during \"objdump -D\" execution. 64Description: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
65Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752 65Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
66 66
67CVE-2017-9751 67CVE-2017-14496
68Package: GNU Binutils 68Package: dnsmasq
69Score: 6.8 (Medium) 69Score: 7.0 (High)
70Description: opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 70Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
71Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751 71Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496
72 72
73CVE-2017-9750 73CVE-2017-14106
74Package: GNU Binutils 74Package: kernel
75Score: 6.8 (Medium) 75Score: 4.9 (Medium)
76Description: opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 76Description: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
77Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750 77Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
78 78
79CVE-2017-9749 79CVE-2017-13081
80Package: GNU Binutils 80Package: linux-firmware
81Score: 6.8 (Medium) 81Score: 2.9 (Minor)
82Description: The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 82Description: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
83Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749 83Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
84 84
85CVE-2017-9748 85CVE-2017-13080
86Package: GNU Binutils 86Package: linux-firmware
87Score: 6.8 (Medium) 87Score: 2.9 (Minor)
88Description: The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug. 88Description: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
89Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748 89Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
90 90
91CVE-2017-9747 91CVE-2017-12132
92Package: GNU Binutils (libbfd) 92Package: glibc
93Score: 6.8 (Medium) 93Score: 4.3 (Medium)
94Description: The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug. 94Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
95Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747 95Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132
96 96
97CVE-2017-9746 97CVE-2017-11176
98Package: GNU Binutils 98Package: kernel
99Score: 6.8 (Medium) 99Score: 10.0 (High)
100Description: The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution. 100Description: The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
101Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746 101Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
102 102
103CVE-2017-9745 103CVE-2017-9955
104Package: GNU Binutils (libbfd) 104Package: GNU Binutils
105Score: 6.8 (Medium) 105Score: 4.3 (Medium)
106Description: The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 106Description: The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.
107Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745 107Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955
108 108
109CVE-2017-9744 109CVE-2017-9954
110Package: GNU Binutils (libbfd) 110Package: GNU Binutils
111Score: 6.8 (Medium) 111Score: 4.3 (Medium)
112Description: The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 112Description: The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program.
113Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744 113Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
114 114
115CVE-2017-9742 115CVE-2017-9756
116Package: GNU Binutils (objdump) 116Package: GNU Binutils
117Score: 6.8 (Medium) 117Score: 6.8 (Medium)
118Description: The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. 118Description: The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
119Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742 119Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756
120 120
121CVE-2017-9445 121CVE-2017-9755
122Package: systemd 122Package: GNU Binutils (objdump)
123Score: 5.0 (Medium) 123Score: 6.8 (Medium)
124Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. 124Description: opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
125Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445 125Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755
126 126
127CVE-2017-9050 127CVE-2017-9753
128Package: libxml2-native 128Package: GNU Binutils
129Score: 5.0 (Medium) 129Score: 6.8 (Medium)
130Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. 130Description: The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
131Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 131Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753
132 132
133CVE-2017-9049 133CVE-2017-9752
134Package: libxml2-native 134Package: GNU Binutils, libbfd
135Score: 5.0 (Medium) 135Score: 6.8 (Medium)
136Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398. 136Description: bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during \"objdump -D\" execution.
137Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 137Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752
138 138
139CVE-2017-9048 139CVE-2017-9751
140Package: libxml2-native 140Package: GNU Binutils
141Score: 5.0 (Medium) 141Score: 6.8 (Medium)
142Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. 142Description: opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
143Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 143Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751
144 144
145CVE-2017-9047 145CVE-2017-9750
146Package: libxml2-native 146Package: GNU Binutils
147Score: 5.0 (Medium) 147Score: 6.8 (Medium)
148Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash. 148Description: opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
149Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 149Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750
150 150
151CVE-2017-9044 151CVE-2017-9749
152Package: GNU Binutils (readelf) 152Package: GNU Binutils
153Score: 4.3 (Medium) 153Score: 6.8 (Medium)
154Description: The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file. 154Description: The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044 155Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749
156 156
157CVE-2017-9042 157CVE-2017-9748
158Package: GNU Binutils 158Package: GNU Binutils
159Score: 6.8 (Medium) 159Score: 6.8 (Medium)
160Description: readelf.c in GNU Binutils 2017-04-12 has a \"cannot be represented in type long\" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. 160Description: The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.
161Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042 161Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748
162 162
163CVE-2017-9040 163CVE-2017-9747
164Package: GNU Binutils 164Package: GNU Binutils (libbfd)
165Score: 4.3 (Medium) 165Score: 6.8 (Medium)
166Description: GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt. 166Description: The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution. NOTE: this may be related to a compiler bug.
167Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040 167Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747
168 168
169CVE-2017-9039 169CVE-2017-9746
170Package: GNU Binutils (readelf) 170Package: GNU Binutils
171Score: 4.3 (Medium) 171Score: 6.8 (Medium)
172Description: GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c. 172Description: The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during \"objdump -D\" execution.
173Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039 173Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746
174 174
175CVE-2017-9038 175CVE-2017-9745
176Package: GNU Binutils (readelf) 176Package: GNU Binutils (libbfd)
177Score: 4.3 (Medium) 177Score: 6.8 (Medium)
178Description: GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets. 178Description: The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
179Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038 179Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745
180 180
181CVE-2017-8872 181CVE-2017-9744
182Package: libxml2-native 182Package: GNU Binutils (libbfd)
183Score: 6.4 (Medium) 183Score: 6.8 (Medium)
184Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. 184Description: The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
185Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 185Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744
186 186
187CVE-2017-8831 187CVE-2017-9742
188Package: kernel 188Package: GNU Binutils (objdump)
189Score: 7.2 (High) 189Score: 6.8 (Medium)
190Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability. 190Description: The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during \"objdump -D\" execution.
191Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831 191Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
192 192
193CVE-2017-8804 193CVE-2017-9445
194Package: glibc 194Package: systemd
195Score: 7.8 (High) 195Score: 5.0 (Medium)
196Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. 196Description: In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
197Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804 197Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445
198 198
199CVE-2017-8779 199CVE-2017-9050
200Package: rpcbind 200Package: libxml2-native
201Score: 7.8 (High) 201Score: 5.0 (Medium)
202Description: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb 202Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
203Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779 203Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
204 204
205CVE-2017-8421 205CVE-2017-9049
206Package: GNU Binutils 206Package: libxml2-native
207Score: 7.1 (High) 207Score: 5.0 (Medium)
208Description: The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this. 208Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
209Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421 209Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
210 210
211CVE-2017-8398 211CVE-2017-9048
212Package: GNU Binutils 212Package: libxml2-native
213Score: 5.0 (Medium) 213Score: 5.0 (Medium)
214Description: dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash. 214Description: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
215Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398 215Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
216 216
217CVE-2017-8397 217CVE-2017-9047
218Package: GNU Binutils 218Package: libxml2-native
219Score: 5.0 (Medium) 219Score: 5.0 (Medium)
220Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. 220Description: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
221Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397 221Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
222 222
223CVE-2017-8396 223CVE-2017-9044
224Package: GNU Binutils 224Package: GNU Binutils (readelf)
225Score: 5.0 (Medium) 225Score: 4.3 (Medium)
226Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. 226Description: The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file.
227Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396 227Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
228 228
229CVE-2017-8395 229CVE-2017-9042
230Package: GNU Binutils 230Package: GNU Binutils
231Score: 5.0 (Medium) 231Score: 6.8 (Medium)
232Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash. 232Description: readelf.c in GNU Binutils 2017-04-12 has a \"cannot be represented in type long\" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
233Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395 233Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
234 234
235CVE-2017-8394 235CVE-2017-9040
236Package: GNU Binutils 236Package: GNU Binutils
237Score: 5.0 (Medium) 237Score: 4.3 (Medium)
238Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash. 238Description: GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.
239Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394 239Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
240 240
241CVE-2017-8393 241CVE-2017-9039
242Package: GNU Binutils 242Package: GNU Binutils (readelf)
243Score: 5.0 (Medium) 243Score: 4.3 (Medium)
244Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash. 244Description: GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
245Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393 245Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
246 246
247CVE-2017-8392 247CVE-2017-9038
248Package: binutils 248Package: GNU Binutils (readelf)
249Score: 5.0 (Medium) 249Score: 4.3 (Medium)
250Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash. 250Description: GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
251Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392 251Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
252 252
253CVE-2017-8283 253CVE-2017-8872
254Package: dpkg 254Package: libxml2-native
255Score: 7.5 (High) 255Score: 6.4 (Medium)
256Description: dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD. 256Description: The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
257Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8283 257Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
258 258
259CVE-2017-8105 259CVE-2017-8831
260Package: freetype 260Package: kernel
261Score: 7.5 (High) 261Score: 7.2 (High)
262Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c. 262Description: The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.10.14 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
263Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 263Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831
264 264
265CVE-2017-8072 265CVE-2017-8804
266Package: kernel 266Package: glibc
267Score: 7.2 (High) 267Score: 7.8 (High)
268Description: The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors. 268Description: The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779.
269Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072 269Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804
270 270
271CVE-2017-8071 271CVE-2017-8779
272Package: kernel 272Package: rpcbind
273Score: 2.1 (Low) 273Score: 7.8 (High)
274Description: drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors. 274Description: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb
275Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8071 275Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
276 276
277CVE-2017-8070 277CVE-2017-8421
278Package: kernel 278Package: GNU Binutils
279Score: 7.2 (High) 279Score: 7.1 (High)
280Description: drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 280Description: The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.
281Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070 281Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
282 282
283CVE-2017-8069 283CVE-2017-8398
284Package: kernel 284Package: GNU Binutils
285Score: 7.2 (High) 285Score: 5.0 (Medium)
286Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 286Description: dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash.
287Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069 287Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
288 288
289CVE-2017-8068 289CVE-2017-8397
290Package: kernel 290Package: GNU Binutils
291Score: 7.2 (High) 291Score: 5.0 (Medium)
292Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 292Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
293Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068 293Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
294 294
295CVE-2017-8067 295CVE-2017-8396
296Package: kernel 296Package: GNU Binutils
297Score: 7.2 (High) 297Score: 5.0 (Medium)
298Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 298Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
299Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067 299Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
300 300
301CVE-2017-8066 301CVE-2017-8395
302Package: kernel 302Package: GNU Binutils
303Score: 7.2 (High) 303Score: 5.0 (Medium)
304Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 304Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
305Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066 305Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
306 306
307CVE-2017-8065 307CVE-2017-8394
308Package: kernel 308Package: GNU Binutils
309Score: 7.2 (High) 309Score: 5.0 (Medium)
310Description: rypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 310Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
311Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065 311Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
312 312
313CVE-2017-8064 313CVE-2017-8393
314Package: kernel 314Package: GNU Binutils
315Score: 7.2 (High) 315Score: 5.0 (Medium)
316Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 316Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.
317Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064 317Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
318 318
319CVE-2017-8063 319CVE-2017-8392
320Package: kernel 320Package: GNU Binutils
321Score: 7.2 (High) 321Score: 5.0 (Medium)
322Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 322Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
323Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063 323Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392
324 324
325CVE-2017-8062 325CVE-2017-8283
326Package: kernel 326Package: dpkg
327Score: 7.2 (High) 327Score: 7.5 (High)
328Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 328Description: dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
329Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062 329Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8283
330 330
331CVE-2017-8061 331CVE-2017-8105
332Package: kernel 332Package: freetype
333Score: 7.2 (High) 333Score: 7.5 (High)
334Description: drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 334Description: FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
335Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8061 335Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
336 336
337CVE-2017-7895 337CVE-2017-8072
338Package: kernel 338Package: kernel
339Score: 10.0 (High) 339Score: 7.2 (High)
340Description: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. 340Description: The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
341Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895 341Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072
342 342
343CVE-2017-7869 343CVE-2017-8071
344Package: gnutls 344Package: kernel
345Score: 5.0 (Medium) 345Score: 2.1 (Low)
346Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10. 346Description: drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors.
347Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869 347Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8071
348 348
349CVE-2017-7645 349CVE-2017-8070
350Package: kernel 350Package: kernel
351Score: 7.8 (High) 351Score: 7.2 (High)
352Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. 352Description: drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
353Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645 353Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070
354 354
355CVE-2017-7618 355CVE-2017-8069
356Package: kernel 356Package: kernel
357Score: 7.8 (High) 357Score: 7.2 (High)
358Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue. 358Description: drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
359Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618 359Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069
360 360
361CVE-2017-7614 361CVE-2017-8068
362Package: GNU Binutils 362Package: kernel
363Score: 7.5 (High) 363Score: 7.2 (High)
364Description: elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a \"member access within null pointer\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an \"int main() {return 0;}\" program. 364Description: drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
365Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614 365Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068
366 366
367CVE-2017-7487 367CVE-2017-8067
368Package: kernel 368Package: kernel
369Score: 7.2 (High) 369Score: 7.2 (High)
370Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface. 370Description: drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
371Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487 371Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067
372 372
373CVE-2017-7472 373CVE-2017-8066
374Package: kernel 374Package: kernel
375Score: 4.9 (Medium) 375Score: 7.2 (High)
376Description: The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls. 376Description: drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
377Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472 377Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066
378 378
379CVE-2017-7468 379CVE-2017-8065
380Package: curl 380Package: kernel
381Score: 6.0 (Medium) 381Score: 7.2 (High)
382Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). 382Description: rypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
383Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468 383Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065
384 384
385CVE-2017-7407 385CVE-2017-8064
386Package: curl 386Package: kernel
387Score: 2.1 (Low) 387Score: 7.2 (High)
388Description: The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read. 388Description: drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
389Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407 389Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064
390 390
391CVE-2017-7304 391CVE-2017-8063
392Package: Binutils 392Package: kernel
393Score: 5.0 (Medium) 393Score: 7.2 (High)
394Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash. 394Description: drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
395Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304 395Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063
396 396
397CVE-2017-7223 397CVE-2017-8062
398Package: GNU Binutils 398Package: kernel
399Score: 5.0 (Medium) 399Score: 7.2 (High)
400Description: GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash. 400Description: drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
401Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223 401Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062
402 402
403CVE-2017-7210 403CVE-2017-8061
404Package: binutils 404Package: kernel
405Score: 7.8 (High) 405Score: 7.2 (High)
406Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash. 406Description: drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
407Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 407Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8061
408 408
409CVE-2017-7209 409CVE-2017-7895
410Package: binutils 410Package: kernel
411Score: 4.3 (Medium) 411Score: 10.0 (High)
412Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash. 412Description: The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
413Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209 413Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895
414 414
415CVE-2017-6969 415CVE-2017-7869
416Package: binutils 416Package: gnutls
417Score: 6.4 (Medium) 417Score: 5.0 (Medium)
418Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well. 418Description: GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
419Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969 419Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
420 420
421CVE-2017-6966 421CVE-2017-7645
422Package: binutil 422Package: kernel
423Score: 4.0 (Medium) 423Score: 7.8 (High)
424Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations. 424Description: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
425Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966 425Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645
426 426
427CVE-2017-6965 427CVE-2017-7618
428Package: binutils 428Package: kernel
429Score: 4.3 (Medium) 429Score: 7.8 (High)
430Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow. 430Description: crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
431Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965 431Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618
432 432
433CVE-2017-6874 433CVE-2017-7614
434Package: Kernel 434Package: GNU Binutils
435Score: 7.0 (High) 435Score: 7.5 (High)
436Description: Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts. 436Description: elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a \"member access within null pointer\" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an \"int main() {return 0;}\" program.
437Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874 437Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
438 438
439CVE-2017-6353 439CVE-2017-7487
440Package: Kernel 440Package: kernel
441Score: 5.0 (Medium) 441Score: 7.2 (High)
442Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. 442Description: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
443Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353 443Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487
444 444
445CVE-2017-6348 445CVE-2017-7472
446Package: Kernel 446Package: kernel
447Score: 5.0 (Medium) 447Score: 4.9 (Medium)
448Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices. 448Description: The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
449Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348 449Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472
450 450
451CVE-2017-6347 451CVE-2017-7468
452Package: Kernel 452Package: curl
453Score: 7.0 (High) 453Score: 6.0 (Medium)
454Description: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission. 454Description: libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate).
455Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347 455Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468
456 456
457CVE-2017-6346 457CVE-2017-7407
458Package: Kernel 458Package: curl
459Score: 7.0 (High) 459Score: 2.1 (Low)
460Description: Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls. 460Description: The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
461Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346 461Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
462 462
463CVE-2017-6345 463CVE-2017-7304
464Package: Kernel 464Package: Binutils
465Score: 5.0 (Medium) 465Score: 5.0 (Medium)
466Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls. 466Description: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.
467Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345 467Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304
468 468
469CVE-2017-6214 469CVE-2017-7223
470Package: Kernel 470Package: GNU Binutils
471Score: 5.0 (Medium) 471Score: 5.0 (Medium)
472Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag. 472Description: GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
473Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214 473Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223
474 474
475CVE-2017-6074 475CVE-2017-7210
476Package: Kernel 476Package: binutils
477Score: 8.0 (High) 477Score: 7.8 (High)
478Description: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call. 478Description: objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
479Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074 479Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
480 480
481CVE-2017-6001 481CVE-2017-7209
482Package: Kernel 482Package: binutils
483Score: 8.0 (High) 483Score: 4.3 (Medium)
484Description: Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786. 484Description: The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.
485Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001 485Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
486 486
487CVE-2017-5986 487CVE-2017-6969
488Package: Kernel 488Package: binutils
489Score: 7.0 (High) 489Score: 6.4 (Medium)
490Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state. 490Description: readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
491Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986 491Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
492 492
493CVE-2017-5970 493CVE-2017-6966
494Package: Kernel 494Package: binutil
495Score: 5.0 (Medium) 495Score: 4.0 (Medium)
496Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options. 496Description: readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
497Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970 497Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
498 498
499CVE-2017-5969 499CVE-2017-6965
500Package: libxml2-native 500Package: binutils
501Score: 2.6 (Low) 501Score: 4.3 (Medium)
502Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser." 502Description: readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
503Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969 503Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
504 504
505CVE-2017-5848 505CVE-2017-6874
506Package: gstreamer 506Package: Kernel
507Score: 5.0 (Medium) 507Score: 7.0 (High)
508Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing. 508Description: Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.
509Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848 509Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874
510 510
511CVE-2017-5847 511CVE-2017-6353
512Package: gstreamer 512Package: Kernel
513Score: 5.0 (Medium) 513Score: 5.0 (Medium)
514Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors. 514Description: net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
515Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847 515Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353
516 516
517CVE-2017-5669 517CVE-2017-6348
518Package: Kernel 518Package: Kernel
519Score: 5.0 (Medium) 519Score: 5.0 (Medium)
520Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context. 520Description: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
521Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669 521Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348
522 522
523CVE-2017-5618 523CVE-2017-6347
524Package: GNU screen 524Package: Kernel
525Score: 7.2 (High) 525Score: 7.0 (High)
526Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions. 526Description: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.
527Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618 527Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347
528 528
529CVE-2017-5601 529CVE-2017-6346
530Package: libarchive 530Package: Kernel
531Score: 5.0 (Medium) 531Score: 7.0 (High)
532Description: An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive. 532Description: Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
533Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601 533Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346
534 534
535CVE-2017-5577 535CVE-2017-6345
536Package: Kernel 536Package: Kernel
537Score: 5.0 (Medium) 537Score: 5.0 (Medium)
538Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call. 538Description: The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
539Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577 539Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345
540 540
541CVE-2017-5576 541CVE-2017-6214
542Package: Kernel 542Package: Kernel
543Score: 7.0 (High) 543Score: 5.0 (Medium)
544Description: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call. 544Description: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
545Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576 545Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214
546 546
547CVE-2017-5551 547CVE-2017-6074
548Package: Kernel 548Package: Kernel
549Score: 4.0 (Medium) 549Score: 8.0 (High)
550Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. 550Description: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
551Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551 551Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074
552 552
553CVE-2017-5548 553CVE-2017-6001
554Package: Kernel 554Package: Kernel
555Score: 7.0 (High) 555Score: 8.0 (High)
556Description: drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 556Description: Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
557Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548 557Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001
558 558
559CVE-2017-5547 559CVE-2017-5986
560Package: Kernel 560Package: Kernel
561Score: 7.0 (High) 561Score: 7.0 (High)
562Description: drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist. 562Description: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
563Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5547 563Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986
564 564
565CVE-2017-5546 565CVE-2017-5970
566Package: Kernel 566Package: Kernel
567Score: 7.0 (High) 567Score: 5.0 (Medium)
568Description: The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number. 568Description: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
569Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5546 569Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970
570 570
571CVE-2017-5335 571CVE-2017-5969
572Package: GnuTLS 572Package: libxml2-native
573Score: 5.0 (Medium) 573Score: 2.6 (Low)
574Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. 574Description: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
575Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335 575Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969
576 576
577CVE-2017-5225 577CVE-2017-5848
578Package: tiff 578Package: gstreamer
579Score: 7.5 (High) 579Score: 5.0 (Medium)
580Description: LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value. 580Description: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
581Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225 581Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
582 582
583CVE-2017-5029 583CVE-2017-5847
584Package: libxslt 584Package: gstreamer
585Score: 6.8 (Medium) 585Score: 5.0 (Medium)
586Description: The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. 586Description: The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors.
587Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029 587Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847
588 588
589CVE-2017-3731 589CVE-2017-5669
590Package: OpenSSL 590Package: Kernel
591Score: 5.0 (Medium) 591Score: 5.0 (Medium)
592Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. 592Description: The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
593Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731 593Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669
594 594
595CVE-2017-3136 595CVE-2017-5618
596Package: bind 596Package: GNU screen
597Score: 5.9 (Medium) 597Score: 7.2 (High)
598Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. 598Description: GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
599Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136 599Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618
600 600
601CVE-2017-3135 601CVE-2017-5601
602Package: bind 602Package: libarchive
603Score: 6.0 (Medium) 603Score: 5.0 (Medium)
604Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. 604Description: An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.
605Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135 605Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601
606 606
607CVE-2017-2636 607CVE-2017-5577
608Package: Kernel 608Package: Kernel
609Score: 7.2 (High) 609Score: 5.0 (Medium)
610Description: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. 610Description: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
611Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636 611Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577
612 612
613CVE-2017-2628 613CVE-2017-5576
614Package: curl 614Package: Kernel
615Score: 0.0 (Low) 615Score: 7.0 (High)
616Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server. 616Description: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.
617Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628 617Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576
618 618
619CVE-2017-18017 619CVE-2017-5551
620Package: kernel 620Package: Kernel
621Score: 5.0 (Medium) 621Score: 4.0 (Medium)
622Description: The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. 622Description: The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
623Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017 623Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551
624 624
625CVE-2017-14496 625CVE-2017-5548
626Package: dnsmasq 626Package: Kernel
627Score: 7.0 (High) 627Score: 7.0 (High)
628Description: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request. 628Description: drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
629Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496 629Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548
630 630
631CVE-2017-14106 631CVE-2017-5547
632Package: kernel 632Package: Kernel
633Score: 4.9 (Medium) 633Score: 7.0 (High)
634Description: The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. 634Description: drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
635Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106 635Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5547
636 636
637CVE-2017-12132 637CVE-2017-5546
638Package: glibc 638Package: Kernel
639Score: 4.3 (Medium) 639Score: 7.0 (High)
640Description: The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation. 640Description: The freelist-randomization feature in mm/slab.c in the Linux kernel 4.8.x and 4.9.x before 4.9.5 allows local users to cause a denial of service (duplicate freelist entries and system crash) or possibly have unspecified other impact in opportunistic circumstances by leveraging the selection of a large value for a random number.
641Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132 641Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5546
642 642
643CVE-2017-11176 643CVE-2017-5335
644Package: kernel 644Package: GnuTLS
645Score: 10.0 (High) 645Score: 5.0 (Medium)
646Description: The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. 646Description: The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
647Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176 647Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
648 648
649CVE-2017-1000366 649CVE-2017-5225
650Package: glibc 650Package: tiff
651Score: 7.2 (High) 651Score: 7.5 (High)
652Description: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. 652Description: LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
653Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 653Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225
654 654
655CVE-2017-1000365 655CVE-2017-5029
656Package: kernel 656Package: libxslt
657Score: 7.2 (High) 657Score: 6.8 (Medium)
658Description: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23. 658Description: The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
659Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365 659Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029
660 660
661CVE-2017-1000251 661CVE-2017-3731
662Package: kernel 662Package: OpenSSL
663Score: 8.3 (High) 663Score: 5.0 (Medium)
664Description: The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space. 664Description: If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
665Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251 665Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
666 666
667CVE-2017-1000111 667CVE-2017-3136
668Package: kernel 668Package: bind
669Score: 7.2 (High) 669Score: 5.9 (Medium)
670Description: Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW. 670Description: A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met.
671Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111 671Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136
672 672
673CVE-2017-1000101 673CVE-2017-3135
674Package: curl 674Package: bind
675Score: 4.0 (Medium) 675Score: 6.0 (Medium)
676Description: curl supports "globbing" of URLs, in which a user can pass a numerical rangeto have the tool iterate over those numbers to do a sequence of transfers.In the globbing function that parses the numerical range, there was anomission that made curl read a byte beyond the end of the URL if given acarefully crafted, or just wrongly written, URL. The URL is stored in a heapbased buffer, so it could then be made to wrongly read something else insteadof crashing. 676Description: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer.
677Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101 677Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
678 678
679CVE-2017-1000100 679CVE-2017-2636
680Package: curl 680Package: Kernel
681Score: 4.0 (Medium) 681Score: 7.2 (High)
682Description: When doing an TFTP upload and curl/libcurl is given a URL that contains a verylong file name (longer than about 515 bytes), the file name is truncated tofit within the buffer boundaries, but the buffer size is still wrongly updatedto use the untruncated length. This too large value is then used in the`send()` call, making curl attempt to send more data than what is actually putinto the buffer. The `send()` function will then read beyond the end of theheap based buffer. 682Description: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
683Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 683Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636
684 684
685CVE-2017-1000082 685CVE-2017-2628
686Package: systemd 686Package: curl
687Score: 10.0 (High) 687Score: 0.0 (Low)
688Description: systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended. 688Description: It was found that the fix for CVE-2015-3148 in curl was incomplete. An application using libcurl with HTTP Negotiate authentication could incorrectly re-use credentials for subsequent requests to the same server.
689Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082 689Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628
690 690
691CVE-2016-9844 691CVE-2016-10350
692Package: unzip 692Package: libarchive
693Score: 2.1 (Low) 693Score: 4.3 (Medium)
694Description: Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header. 694Description: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
695Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844 695Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350
696 696
697CVE-2016-9754 697CVE-2016-10349
698Package: Kernel 698Package: libarchive
699Score: 7.0 (High) 699Score: 4.2 (Medium)
700Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file. 700Description: The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
701Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754 701Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349
702 702
703CVE-2016-9444 703CVE-2016-10229
704Package: bind 704Package: kernel
705Score: 7.0 (High) 705Score: 10.0 (High)
706Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer. 706Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag.
707Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444 707Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229
708 708
709CVE-2016-9401 709CVE-2016-10228
710Package: bash 710Package: glibc
711Score: 2.0 (Low) 711Score: 4.2 (Medium)
712Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6 712Description: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
713Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401 713Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
714 714
715CVE-2016-9318 715CVE-2016-10208
716Package: libxml2-native 716Package: Kernel
717Score: 6.8 (Medium) 717Score: 5.0 (Medium)
718Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. 718Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
719Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 719Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208
720 720
721CVE-2016-9083 721CVE-2016-10200
722Package: Kernel 722Package: Kernel
723Score: 8.0 (High) 723Score: 7.0 (High)
724Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug." 724Description: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
725Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083 725Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200
726 726
727CVE-2016-8864 727CVE-2016-10154
728Package: bind 728Package: Kernel
729Score: 5.0 (Medium) 729Score: 5.0 (Medium)
730Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c. 730Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist.
731Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864 731Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154
732 732
733CVE-2016-8858 733CVE-2016-10153
734Package: OpenSSL 734Package: Kernel
735Score: 7.8 (High) 735Score: 7.0 (High)
736Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server’s memory. 736Description: The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code.
737Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858 737Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153
738 738
739CVE-2016-8655 739CVE-2016-10150
740Package: Kernel 740Package: KVM
741Score: 8.0 (High) 741Score: 10.0 (High)
742Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions. 742Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device.
743Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655 743Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150
744 744
745CVE-2016-8636 745CVE-2016-10147
746Package: Kernel 746Package: Kernel
747Score: 7.0 (High) 747Score: 5.0 (Medium)
748Description: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology. 748Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
749Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636 749Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147
750 750
751CVE-2016-8630 751CVE-2016-10044
752Package: Kernel 752Package: Kernel
753Score: 6.0 (Medium) 753Score: 7.0 (High)
754Description: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction. 754Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
755Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630 755Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
756 756
757CVE-2016-8625 757CVE-2016-9844
758Package: curl 758Package: unzip
759Score: 6.9 (Medium) 759Score: 2.1 (Low)
760Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German ßcharacter (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `straße.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn. 760Description: Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
761Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625 761Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844
762 762
763CVE-2016-8624 763CVE-2016-9754
764Package: curl 764Package: Kernel
765Score: 6.9 (Medium) 765Score: 7.0 (High)
766Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes. 766Description: The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file.
767Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 767Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9754
768 768
769CVE-2016-8623 769CVE-2016-9444
770Package: curl 770Package: bind
771Score: 4.9 (Medium) 771Score: 7.0 (High)
772Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls. 772Description: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
773Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 773Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
774 774
775CVE-2016-8622 775CVE-2016-9401
776Package: curl 776Package: bash
777Score: 4.9 (Medium) 777Score: 2.0 (Low)
778Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program. 778Description: ref to yocto patch: http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=1b2857a781b6666feaf5d3c91dc02ac263d0c4f6
779Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 779Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401
780 780
781CVE-2016-8621 781CVE-2016-9318
782Package: curl 782Package: libxml2-native
783Score: 4.9 (Medium) 783Score: 6.8 (Medium)
784Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds. 784Description: libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
785Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 785Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
786 786
787CVE-2016-8620 787CVE-2016-9083
788Package: curl 788Package: Kernel
789Score: 6.9 (Medium) 789Score: 8.0 (High)
790Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer. 790Description: drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
791Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620 791Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083
792 792
793CVE-2016-8619 793CVE-2016-8864
794Package: curl 794Package: bind
795Score: 6.9 (Medium) 795Score: 5.0 (Medium)
796Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver. 796Description: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
797Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 797Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
798 798
799CVE-2016-8618 799CVE-2016-8858
800Package: curl 800Package: OpenSSL
801Score: 6.9 (Medium) 801Score: 7.8 (High)
802Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function. 802Description: A memory exhaustion issue in OpenSSH that can be triggered before user authentication was found. An unauthenticated attacker could consume approx. 400 MB of memory per each connection. The attacker could set up multiple such connections to run out of server’s memory.
803Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 803Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858
804 804
805CVE-2016-8617 805CVE-2016-8655
806Package: curl 806Package: Kernel
807Score: 6.9 (Medium) 807Score: 8.0 (High)
808Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue. 808Description: Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
809Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 809Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655
810 810
811CVE-2016-8616 811CVE-2016-8636
812Package: curl 812Package: Kernel
813Score: 3.9 (Low) 813Score: 7.0 (High)
814Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw. 814Description: Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
815Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 815Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636
816 816
817CVE-2016-8615 817CVE-2016-8630
818Package: curl 818Package: Kernel
819Score: 6.9 (Medium) 819Score: 6.0 (Medium)
820Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw. 820Description: The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
821Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 821Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630
822 822
823CVE-2016-7795 823CVE-2016-8625
824Package: systemd 824Package: curl
825Score: 4.9 (Medium) 825Score: 6.9 (Medium)
826Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. 826Description: When curl is built with libidn to handle International Domain Names (IDNA), ittranslates them to puny code for DNS resolving using the IDNA 2003 standard,while IDNA 2008 is the modern and up-to-date IDNA standard.This misalignment causes problems with for example domains using the German ßcharacter (known as the Unicode Character 'LATIN SMALL LETTER SHARP S') whichis used at times in the .de TLD and is translated differently in the two IDNAstandards, leading to users potentially and unknowingly issuing networktransfer requests to the wrong host.For example, `straße.de` is translated into `strasse.de` using IDNA 2003 butis translated into `xn--strae-oqa.de` using IDNA 2008. Needless to say, thosehost names could very well resolve to different addresses and be twocompletely independent servers. IDNA 2008 is mandatory for .de domains.curl is not alone with this problem, as there's currently a big flux in theworld of network user-agents about which IDNA version to support and use.This name problem exists for DNS-using protocols in curl, but only when builtto use libidn.
827Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795 827Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
828 828
829CVE-2016-7097 829CVE-2016-8624
830Package: Kernel 830Package: curl
831Score: 3.6 (Low) 831Score: 6.9 (Medium)
832Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. 832Description: curl doesn't parse the authority component of the URL correctly when the hostname part ends with a '#' character, and could instead be tricked intoconnecting to a different host. This may have security implications if you forexample use an URL parser that follows the RFC to check for allowed domainsbefore using curl to request them.Passing in `http://example.com#@evil.com/x.txt` would wrongly make curl send arequest to evil.com while your browser would connect to example.com given thesame URL.The problem exists for most protocol schemes.
833Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097 833Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
834 834
835CVE-2016-6489 835CVE-2016-8623
836Package: nettle 836Package: curl
837Score: 5.0 (Medium) 837Score: 4.9 (Medium)
838Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack. 838Description: libcurl explicitly allows users to share cookies between multiple easy handlesthat are concurrently employed by different threads.When cookies to be sent to a server are collected, the matching functioncollects all cookies to send and the cookie lock is released immediatelyafterwards. That function however only returns a list with *references* back tothe original strings for name, value, path and so on. Therefore, if anotherthread quickly takes the lock and frees one of the original cookie structstogether with its strings, a use-after-free can occur and lead to informationdisclosure. Another thread can also replace the contents of the cookies fromseparate HTTP responses or API calls.
839Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489 839Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
840 840
841CVE-2016-6480 841CVE-2016-8622
842Package: Kernel 842Package: curl
843Score: 4.7 (Medium) 843Score: 4.9 (Medium)
844Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability. 844Description: The URL percent-encoding decode function in libcurl is called`curl_easy_unescape`. Internally, even if this function would be made toallocate a unscape destination buffer larger than 2GB, it would return thatnew length in a signed 32 bit integer variable, thus the length would geteither just truncated or both truncated and turned negative. That could thenlead to libcurl writing outside of its heap based buffer.This can be triggered by a user on a 64bit system if the user can send in acustom (very large) URL to a libcurl using program.
845Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480 845Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
846 846
847CVE-2016-6354 847CVE-2016-8621
848Package: flex 848Package: curl
849Score: 7.5 (High) 849Score: 4.9 (Medium)
850Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. 850Description: The `curl_getdate` converts a given date string into a numerical timestamp andit supports a range of different formats and possibilites to express a dateand time. The underlying date parsing function is also used internally whenparsing for example HTTP cookies (possibly received from remote servers) andit can be used when doing conditional HTTP requests.The date parser function uses the libc sscanf() function at two places, withthe parsing strings "%02d:%02d" and ""%02d:%02d:%02d". The intent being thatit would parse either a string with HH:MM (two digits colon two digits) orHH:MM:SS (two digits colon two digits colon two digits). If instead the pieceof time that was sent in had the final digit cut off, thus ending with asingle-digit, the date parser code would advance its read pointer one byte toomuch and end up reading out of bounds.
851Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 851Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
852 852
853CVE-2016-6323 853CVE-2016-8620
854Package: glibc 854Package: curl
855Score: 5.0 (Medium) 855Score: 6.9 (Medium)
856Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation. 856Description: The curl tool's "globbing" feature allows a user to specify a numerical rangethrough which curl will iterate. It is typically specified as [1-5],specifying the first and the last numbers in the range. Or with [a-z], usingletters.1. The curl code for parsing the second *unsigned* number did not check for aleading minus character, which allowed a user to specify `[1--1]` with nocomplaints and have the latter `-1` number get turned into the largestunsigned long value the system can handle. This would ultimately cause curl towrite outside the dedicated malloced buffer after no less than 100,000iterations, since it would have room for 5 digits but not 6.2. When the range is specified with letters, and the ending letter is left out`[L-]`, the code would still advance its read pointer 5 bytes even if thestring was just 4 bytes and end up reading outside the given buffer.
857Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323 857Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
858 858
859CVE-2016-6321 859CVE-2016-8619
860Package: Tar (Gnu) 860Package: curl
861Score: 5.0 (Medium) 861Score: 6.9 (Medium)
862Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER. 862Description: In curl's implementation of the Kerberos authentication mechanism, thefunction `read_data()` in security.c is used to fill the necessary krb5structures. When reading one of the length fields from the socket, it fails toensure that the length parameter passed to realloc() is not set to 0.This would lead to realloc() getting called with a zero size and when doing sorealloc() returns NULL *and* frees the memory - in contrary to normalrealloc() fails where it only returns NULL - causing libcurl to free thememory *again* in the error path.This flaw could be triggered by a malicious or just otherwise ill-behavingserver.
863Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 863Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
864 864
865CVE-2016-6318 865CVE-2016-8618
866Package: cracklib 866Package: curl
867Score: 7.5 (High) 867Score: 6.9 (Medium)
868Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer. 868Description: The libcurl API function called `curl_maprintf()` can be tricked into doing adouble-free due to an unsafe `size_t` multiplication, on systems using 32 bit`size_t` variables. The function is also used internallty in numeroussituations.The function doubles an allocated memory area with realloc() and allows thesize to wrap and become zero and when doing so realloc() returns NULL *and*frees the memory - in contrary to normal realloc() fails where it only returnsNULL - causing libcurl to free the memory *again* in the error path.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.This behavior is triggable using the publicly exposed function.
869Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 869Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
870 870
871CVE-2016-6301 871CVE-2016-8617
872Package: busybox 872Package: curl
873Score: 7.1 (High) 873Score: 6.9 (Medium)
874Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop. 874Description: In libcurl's base64 encode function, the output buffer is allocated as followswithout any checks on insize: malloc( insize * 4 / 3 + 4 )On systems with 32-bit addresses in userspace (e.g. x86, ARM, x32), themultiplication in the expression wraps around if insize is at least 1GB ofdata. If this happens, an undersized output buffer will be allocated, but thefull result will be written, thus causing the memory behind the output bufferto be overwritten.If a username is set directly via `CURLOPT_USERNAME` (or curl's `-u, --user`option), this vulnerability can be triggered. The name has to be at least512MB big in a 32bit system.Systems with 64 bit versions of the `size_t` type are not affected by thisissue.
875Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301 875Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
876 876
877CVE-2016-6252 877CVE-2016-8616
878Package: shadow 878Package: curl
879Score: 5.0 (Medium) 879Score: 3.9 (Low)
880Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff 880Description: When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections.This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.We are not aware of any exploit of this flaw.
881Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252 881Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
882 882
883CVE-2016-6185 883CVE-2016-8615
884Package: Perl 884Package: curl
885Score: 5.0 (Medium) 885Score: 6.9 (Medium)
886Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. 886Description: If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.The issue pertains to the function that loads cookies into memory, which reads the specified file into a fixed-size buffer in a line-by-line manner using the fgets() function. If an invocation of fgets() cannot read the whole line into the destination buffer due to it being too small, it truncates the output. This way, a very long cookie (name + value) sent by a malicious server would be stored in the file and subsequently that cookie could be read partially and crafted correctly, it could be treated as a different cookie for another server.We are not aware of any exploit of this flaw.
887Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 887Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
888 888
889CVE-2016-6170 889CVE-2016-7795
890Package: bind 890Package: systemd
891Score: 6.0 (Medium) 891Score: 4.9 (Medium)
892Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390 892Description: The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
893Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170 893Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795
894 894
895CVE-2016-6131 895CVE-2016-7097
896Package: gcc 896Package: Kernel
897Score: 4.9 (Medium) 897Score: 3.6 (Low)
898Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling. 898Description: The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
899Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131 899Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097
900 900
901CVE-2016-5636 901CVE-2016-6489
902Package: CPython 902Package: nettle
903Score: 10.0 (High) 903Score: 5.0 (Medium)
904Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. 904Description: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
905Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636 905Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489
906 906
907CVE-2016-5300 907CVE-2016-6480
908Package: expat 908Package: Kernel
909Score: 7.8 (High) 909Score: 4.7 (Medium)
910Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. 910Description: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
911Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 911Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480
912 912
913CVE-2016-5131 913CVE-2016-6354
914Package: libxml2 914Package: flex
915Score: 10.0 (High) 915Score: 7.5 (High)
916Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. 916Description: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
917Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 917Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354
918 918
919CVE-2016-4658 919CVE-2016-6323
920Package: libxml2 920Package: glibc
921Score: 10.0 (High) 921Score: 5.0 (Medium)
922Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. 922Description: The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
923Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 923Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323
924 924
925CVE-2016-4448 925CVE-2016-6321
926Package: libxml2 926Package: Tar (Gnu)
927Score: 10.0 (High) 927Score: 5.0 (Medium)
928Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. 928Description: Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
929Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448 929Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
930 930
931CVE-2016-2775 931CVE-2016-6318
932Package: bind 932Package: cracklib
933Score: 4.3 (Medium) 933Score: 7.5 (High)
934Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. 934Description: Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
935Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775 935Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
936 936
937CVE-2016-2381 937CVE-2016-6301
938Package: Perl 938Package: busybox
939Score: 5.0 (Medium) 939Score: 7.1 (High)
940Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp. 940Description: The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
941Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 941Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6301
942 942
943CVE-2016-2183 943CVE-2016-6252
944Package: OpenSSL 944Package: shadow
945Score: 5.0 (Medium) 945Score: 5.0 (Medium)
946Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. 946Description: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap. Patch: https://bugzilla.suse.com/attachment.cgi?id=684679&action=diff
947Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 947Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252
948 948
949CVE-2016-2147 949CVE-2016-6185
950Package: busybox 950Package: Perl
951Score: 5.0 (Medium) 951Score: 5.0 (Medium)
952Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write. 952Description: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
953Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147 953Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
954 954
955CVE-2016-10350 955CVE-2016-6170
956Package: libarchive 956Package: bind
957Score: 4.3 (Medium) 957Score: 6.0 (Medium)
958Description: The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. 958Description: DNS protocols were designed with the assumption that a certain amount of trust could be presumed between the operators of primary and secondary servers for a given zone. However, in current practice some organizations have scenarios which require them to accept zone data from sources that are not fully trusted (for example: providers of secondary name service). A party who is allowed to feed data into a zone (e.g. by AXFR, IXFR, or Dynamic DNS updates) can overwhelm the server which is accepting data by intentionally or accidentally exhausting that server's memory.https://kb.isc.org/article/AA-01390
959Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350 959Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170
960 960
961CVE-2016-10349 961CVE-2016-6131
962Package: libarchive 962Package: gcc
963Score: 4.2 (Medium) 963Score: 4.9 (Medium)
964Description: The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. 964Description: A stack overflow vulnerability in the libiberty demangler was found, which causes its host application to crash on a tainted branch instruction. The problem is caused by a self-reference in a mangled type string that is "remembered" for later reference. This leads to an infinite recursion during the demangling.
965Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349 965Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6131
966 966
967CVE-2016-10229 967CVE-2016-5636
968Package: kernel 968Package: CPython
969Score: 10.0 (High) 969Score: 10.0 (High)
970Description: udp.c in the Linux kernel before 4.5 allows remote attackers to execute arbitrary code via UDP traffic that triggers an unsafe second checksum calculation during execution of a recv system call with the MSG_PEEK flag. 970Description: Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
971Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229 971Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636
972 972
973CVE-2016-10228 973CVE-2016-5300
974Package: glibc 974Package: expat
975Score: 4.2 (Medium) 975Score: 7.8 (High)
976Description: The iconv program in the GNU C Library (aka glibc or libc6) 2.25 and earlier, when invoked with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. 976Description: The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
977Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 977Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
978 978
979CVE-2016-10208 979CVE-2016-5131
980Package: Kernel 980Package: libxml2
981Score: 5.0 (Medium) 981Score: 10.0 (High)
982Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image. 982Description: Use-after-free vulnerability in libxml2 (used in chromium-browser) through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
983Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208 983Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
984 984
985CVE-2016-10200 985CVE-2016-4658
986Package: Kernel 986Package: libxml2
987Score: 7.0 (High) 987Score: 10.0 (High)
988Description: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c. 988Description: libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
989Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200 989Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658
990 990
991CVE-2016-10154 991CVE-2016-4448
992Package: Kernel 992Package: libxml2
993Score: 5.0 (Medium) 993Score: 10.0 (High)
994Description: The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist. 994Description: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
995Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154 995Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448
996 996
997CVE-2016-10153 997CVE-2016-2775
998Package: Kernel 998Package: bind
999Score: 7.0 (High) 999Score: 4.3 (Medium)
1000Description: The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code. 1000Description: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
1001Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153 1001Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
1002 1002
1003CVE-2016-10150 1003CVE-2016-2381
1004Package: KVM 1004Package: Perl
1005Score: 10.0 (High) 1005Score: 5.0 (Medium)
1006Description: Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device. 1006Description: Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
1007Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150 1007Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
1008 1008
1009CVE-2016-10147 1009CVE-2016-2183
1010Package: Kernel 1010Package: OpenSSL
1011Score: 5.0 (Medium) 1011Score: 5.0 (Medium)
1012Description: crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5). 1012Description: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
1013Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147 1013Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
1014 1014
1015CVE-2016-10044 1015CVE-2016-2147
1016Package: Kernel 1016Package: busybox
1017Score: 7.0 (High) 1017Score: 5.0 (Medium)
1018Description: The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. 1018Description: Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
1019Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044 1019Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2147
1020 1020
1021CVE-2016-0800 1021CVE-2016-0800
1022Package: OpenSSL 1022Package: OpenSSL
1023Score: 4.3 (Medium) 1023Score: 4.3 (Medium)
1024Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. 1024Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
1025Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800 1025Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800
1026 1026
1027CVE-2016-0718 1027CVE-2016-0718
1028Package: expat 1028Package: expat
1029Score: 7.5 (High) 1029Score: 7.5 (High)
1030Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. 1030Description: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
1031Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 1031Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718
1032 1032
1033CVE-2016-0634 1033CVE-2016-0634
1034Package: bash 1034Package: bash
1035Score: 5.0 (Medium) 1035Score: 5.0 (Medium)
1036Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string. 1036Description: A vulnerability was found in a way bash expands the $HOSTNAME. Injecting the hostname with malicious code would cause it to run each time bash expanded \h in the prompt string.
1037Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634 1037Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634
1038 1038
1039CVE-2015-9019 1039CVE-2015-9019
1040Package: libxslt-native 1040Package: libxslt-native
1041Score: 5.0 (Medium) 1041Score: 5.0 (Medium)
1042Description: In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs 1042Description: In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs
1043Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019 1043Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019
1044 1044
1045CVE-2015-5224 1045CVE-2015-5224
1046Package: util-linux 1046Package: util-linux
1047Score: 7.5 (High) 1047Score: 7.5 (High)
1048Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks. 1048Description: The mkostemp function in login-utils in util-linux when used incorrectly allows remote attackers to cause file name collision and possibly other attacks.
1049Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224 1049Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224
1050 1050
1051CVE-2014-9365 1051CVE-2014-9365
1052Package: python 1052Package: python
1053Score: 5.8 (Medium) 1053Score: 5.8 (Medium)
1054Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. 1054Description: The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
1055Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365 1055Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365