rpm package
suse/ardana-barbican&distro=SUSE OpenStack Cloud 8
pkg:rpm/suse/ardana-barbican&distro=SUSE%20OpenStack%20Cloud%208
Vulnerabilities (15)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-9543 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Mar 12, 2020 | OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, update, delete, or share resources that do not belong to them, because of a context-free lookup of a UUID. Attackers may also create resources, such as shared file systems and groups of shares o | ||
| CVE-2020-5247 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Feb 28, 2020 | In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir | ||
| CVE-2019-15026 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Aug 30, 2019 | memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c. | ||
| CVE-2019-0201 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | May 23, 2019 | An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth | ||
| CVE-2019-11596 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Apr 29, 2019 | In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | ||
| CVE-2019-11068 | — | < 8.0+git.1534266594.8136db7-4.30.1 | 8.0+git.1534266594.8136db7-4.30.1 | Apr 10, 2019 | libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded. | ||
| CVE-2019-10876 | — | < 8.0+git.1534266594.8136db7-4.30.1 | 8.0+git.1534266594.8136db7-4.30.1 | Apr 5, 2019 | An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes | ||
| CVE-2019-3871 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Mar 21, 2019 | A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of | ||
| CVE-2019-6975 | — | < 8.0+git.1534266594.8136db7-4.30.1 | 8.0+git.1534266594.8136db7-4.30.1 | Feb 11, 2019 | Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function. | ||
| CVE-2019-3498 | — | < 8.0+git.1534266594.8136db7-4.30.1 | 8.0+git.1534266594.8136db7-4.30.1 | Jan 9, 2019 | In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a use | ||
| CVE-2018-14626 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Nov 29, 2018 | PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. | ||
| CVE-2018-10851 | — | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Nov 29, 2018 | PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. | ||
| CVE-2018-14574 | — | < 8.0+git.1534266594.8136db7-4.30.1 | 8.0+git.1534266594.8136db7-4.30.1 | Aug 3, 2018 | django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect. | ||
| CVE-2016-8611 | — | < 8.0+git.1534266594.8136db7-4.27.2 | 8.0+git.1534266594.8136db7-4.27.2 | Jul 31, 2018 | A vulnerability was found in Openstack Glance. No limits are enforced within the Glance image service for both v1 and v2 `/images` API POST method for authenticated users, resulting in possible denial of service attacks through database table saturation. | ||
| CVE-2017-5637 | Hig | 7.5 | < 8.0+git.1585152761.8ef3d61-4.33.1 | 8.0+git.1585152761.8ef3d61-4.33.1 | Oct 10, 2017 | Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, f |
- CVE-2020-9543Mar 12, 2020affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, update, delete, or share resources that do not belong to them, because of a context-free lookup of a UUID. Attackers may also create resources, such as shared file systems and groups of shares o
- CVE-2020-5247Feb 28, 2020affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir
- CVE-2019-15026Aug 30, 2019affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
- CVE-2019-0201May 23, 2019affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth
- CVE-2019-11596Apr 29, 2019affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
- CVE-2019-11068Apr 10, 2019affected < 8.0+git.1534266594.8136db7-4.30.1fixed 8.0+git.1534266594.8136db7-4.30.1
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
- CVE-2019-10876Apr 5, 2019affected < 8.0+git.1534266594.8136db7-4.30.1fixed 8.0+git.1534266594.8136db7-4.30.1
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes
- CVE-2019-3871Mar 21, 2019affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of
- CVE-2019-6975Feb 11, 2019affected < 8.0+git.1534266594.8136db7-4.30.1fixed 8.0+git.1534266594.8136db7-4.30.1
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
- CVE-2019-3498Jan 9, 2019affected < 8.0+git.1534266594.8136db7-4.30.1fixed 8.0+git.1534266594.8136db7-4.30.1
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a use
- CVE-2018-14626Nov 29, 2018affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
- CVE-2018-10851Nov 29, 2018affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
- CVE-2018-14574Aug 3, 2018affected < 8.0+git.1534266594.8136db7-4.30.1fixed 8.0+git.1534266594.8136db7-4.30.1
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
- CVE-2016-8611Jul 31, 2018affected < 8.0+git.1534266594.8136db7-4.27.2fixed 8.0+git.1534266594.8136db7-4.27.2
A vulnerability was found in Openstack Glance. No limits are enforced within the Glance image service for both v1 and v2 `/images` API POST method for authenticated users, resulting in possible denial of service attacks through database table saturation.
- affected < 8.0+git.1585152761.8ef3d61-4.33.1fixed 8.0+git.1585152761.8ef3d61-4.33.1
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, f