CVE-2014-8595CVE-2014-8595

Affected configuration(s):

cpe:/o:debian:debian_linux:7.0
cpe:/o:novell:opensuse:13.1
cpe:/o:novell:opensuse:13.2
cpe:/o:xen:xen:3.2.1
cpe:/o:xen:xen:3.2.2
cpe:/o:xen:xen:3.2.3
cpe:/o:xen:xen:3.3.0
cpe:/o:xen:xen:3.3.1
cpe:/o:xen:xen:3.3.2
cpe:/o:xen:xen:3.4.0
cpe:/o:xen:xen:3.4.1
cpe:/o:xen:xen:3.4.2
cpe:/o:xen:xen:3.4.3
cpe:/o:xen:xen:3.4.4
cpe:/o:xen:xen:4.0.0
cpe:/o:xen:xen:4.0.1
cpe:/o:xen:xen:4.0.2
cpe:/o:xen:xen:4.0.3
cpe:/o:xen:xen:4.0.4
cpe:/o:xen:xen:4.1.0
cpe:/o:xen:xen:4.1.1
cpe:/o:xen:xen:4.1.2
cpe:/o:xen:xen:4.1.3
cpe:/o:xen:xen:4.1.4
cpe:/o:xen:xen:4.1.5
cpe:/o:xen:xen:4.1.6.1
cpe:/o:xen:xen:4.2.0
cpe:/o:xen:xen:4.2.1
cpe:/o:xen:xen:4.2.2
cpe:/o:xen:xen:4.2.3
cpe:/o:xen:xen:4.3.0
cpe:/o:xen:xen:4.3.1
cpe:/o:xen:xen:4.4.0

Date published: 2014-11-19T13:59:11.707-05:00

Date last modified: 2017-11-14T21:29:05.517-05:00

CVSS Score: 1.9

Principal attack vector: LOCAL

Complexity:  MEDIUM

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html

Summary: arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.

CVE-2014-7840CVE-2014-7840

Affected configuration(s):

cpe:/a:qemu:qemu:-
cpe:/o:redhat:enterprise_linux_desktop:7.0
cpe:/o:redhat:enterprise_linux_hpc_node:7.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0

Date published: 2014-12-12T10:59:08.073-05:00

Date last modified: 2017-09-07T21:29:17.217-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08

Summary: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

CVE-2014-7815CVE-2014-7815

Affected configuration(s):

cpe:/a:qemu:qemu:-
cpe:/o:canonical:ubuntu_linux:10.04:-:lts
cpe:/o:canonical:ubuntu_linux:12.04:-:lts
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.10
cpe:/o:debian:debian_linux:7.0
cpe:/o:redhat:enterprise_linux_desktop:7.0
cpe:/o:redhat:enterprise_linux_hpc_node:7.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0

Date published: 2014-11-14T10:59:01.497-05:00

Date last modified: 2016-12-07T22:06:12.267-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://git.qemu.org/?p=qemu.git;a=commit;h=e6908bfe8e07f2b452e78e677da1b45b1c0f6829

Summary: The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.

CVE-2014-7300CVE-2014-7300

Affected configuration(s):

cpe:/a:gnome:gnome-shell:3.14.0
cpe:/o:redhat:enterprise_linux_desktop:7.0
cpe:/o:redhat:enterprise_linux_hpc_node:7.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0

Date published: 2014-12-25T16:59:02.937-05:00

Date last modified: 2016-08-31T11:08:43.307-04:00

CVSS Score: 7.2

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://openwall.com/lists/oss-security/2014/09/29/17

Summary: GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

CVE-2014-5149CVE-2014-5149

Affected configuration(s):

cpe:/o:novell:opensuse:13.1
cpe:/o:novell:opensuse:13.2
cpe:/o:xen:xen:4.2.0
cpe:/o:xen:xen:4.2.1
cpe:/o:xen:xen:4.2.2
cpe:/o:xen:xen:4.2.3
cpe:/o:xen:xen:4.3.0
cpe:/o:xen:xen:4.3.1
cpe:/o:xen:xen:4.4.0:-

Date published: 2014-08-22T10:55:08.343-04:00

Date last modified: 2017-08-28T21:35:11.953-04:00

CVSS Score: 4.7

Principal attack vector: LOCAL

Complexity:  MEDIUM

Reference URL: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html

Summary: Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.

CVE-2014-5146CVE-2014-5146

Affected configuration(s):

cpe:/o:novell:opensuse:13.1
cpe:/o:novell:opensuse:13.2
cpe:/o:xen:xen:4.2.0
cpe:/o:xen:xen:4.2.1
cpe:/o:xen:xen:4.2.2
cpe:/o:xen:xen:4.2.3
cpe:/o:xen:xen:4.3.0
cpe:/o:xen:xen:4.3.1
cpe:/o:xen:xen:4.4.0:-

Date published: 2014-08-22T10:55:08.283-04:00

Date last modified: 2017-08-28T21:35:11.843-04:00

CVSS Score: 4.7

Principal attack vector: LOCAL

Complexity:  MEDIUM

Reference URL: http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html

Summary: Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.

CVE-2014-3693CVE-2014-3693

Affected configuration(s):

cpe:/a:libreoffice:libreoffice:4.0.0
cpe:/a:libreoffice:libreoffice:4.0.1
cpe:/a:libreoffice:libreoffice:4.0.2
cpe:/a:libreoffice:libreoffice:4.0.3
cpe:/a:libreoffice:libreoffice:4.0.3.3
cpe:/a:libreoffice:libreoffice:4.0.4.2
cpe:/a:libreoffice:libreoffice:4.1.0
cpe:/a:libreoffice:libreoffice:4.1.1
cpe:/a:libreoffice:libreoffice:4.1.2
cpe:/a:libreoffice:libreoffice:4.1.3
cpe:/a:libreoffice:libreoffice:4.1.4
cpe:/a:libreoffice:libreoffice:4.2.0
cpe:/a:libreoffice:libreoffice:4.2.1
cpe:/a:libreoffice:libreoffice:4.2.2
cpe:/a:libreoffice:libreoffice:4.2.3
cpe:/a:libreoffice:libreoffice:4.2.4
cpe:/a:libreoffice:libreoffice:4.2.5
cpe:/a:libreoffice:libreoffice:4.2.6
cpe:/a:libreoffice:libreoffice:4.3.0
cpe:/a:libreoffice:libreoffice:4.3.1
cpe:/a:libreoffice:libreoffice:4.3.2
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.10
cpe:/o:novell:opensuse:13.1
cpe:/o:redhat:enterprise_linux_desktop:7.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0

Date published: 2014-11-07T14:55:03.340-05:00

Date last modified: 2016-12-02T22:01:26.430-05:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html

Summary: Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.

CVE-2014-3691CVE-2014-3691

Affected configuration(s):

cpe:/a:redhat:openstack:4.0
cpe:/a:redhat:openstack:5.0
cpe:/a:theforeman:foreman:1.5.3
cpe:/a:theforeman:foreman:1.6.0
cpe:/a:theforeman:foreman:1.6.1

Date published: 2015-03-09T10:59:00.077-04:00

Date last modified: 2016-08-31T10:54:21.870-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://projects.theforeman.org/issues/7822

Summary: Smart Proxy (aka Smart-Proxy and foreman-proxy) in Foreman before 1.5.4 and 1.6.x before 1.6.2 does not validate SSL certificates, which allows remote attackers to bypass intended authentication and execute arbitrary API requests via a request without a certificate.

CVE-2014-3640CVE-2014-3640

Affected configuration(s):

cpe:/a:qemu:qemu:2.0.0:-
cpe:/a:qemu:qemu:2.0.0:rc0
cpe:/a:qemu:qemu:2.0.0:rc1
cpe:/a:qemu:qemu:2.0.0:rc2
cpe:/a:qemu:qemu:2.0.0:rc3
cpe:/a:qemu:qemu:2.0.2
cpe:/a:qemu:qemu:2.1.0
cpe:/a:qemu:qemu:2.1.0:rc0
cpe:/a:qemu:qemu:2.1.0:rc1
cpe:/a:qemu:qemu:2.1.0:rc2
cpe:/a:qemu:qemu:2.1.0:rc3
cpe:/a:qemu:qemu:2.1.0:rc5
cpe:/a:qemu:qemu:2.1.1
cpe:/o:canonical:ubuntu_linux:10.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.10
cpe:/o:debian:debian_linux:7.0
cpe:/o:redhat:enterprise_linux_desktop:7.0
cpe:/o:redhat:enterprise_linux_hpc_node:7.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0

Date published: 2014-11-07T14:55:02.713-05:00

Date last modified: 2017-11-03T21:29:01.160-04:00

CVSS Score: 2.1

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html

Summary: The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

CVE-2014-8132CVE-2014-8132

Affected configuration(s):

cpe:/a:libssh:libssh:0.5.0
cpe:/a:libssh:libssh:0.5.2
cpe:/a:libssh:libssh:0.5.3
cpe:/a:libssh:libssh:0.5.4
cpe:/a:libssh:libssh:0.5.5
cpe:/a:libssh:libssh:0.6.0
cpe:/a:libssh:libssh:0.6.1
cpe:/a:libssh:libssh:0.6.2
cpe:/a:libssh:libssh:0.6.3
cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:14.10
cpe:/o:debian:debian_linux:7.0
cpe:/o:debian:debian_linux:8.0
cpe:/o:fedoraproject:fedora:19
cpe:/o:fedoraproject:fedora:20
cpe:/o:fedoraproject:fedora:21
cpe:/o:novell:opensuse:12.3
cpe:/o:novell:opensuse:13.1
cpe:/o:novell:opensuse:13.2

Date published: 2014-12-28T19:59:00.060-05:00

Date last modified: 2017-01-02T21:59:18.313-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://advisories.mageia.org/MGASA-2015-0014.html

Summary: Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.