VYPR

rpm package

suse/openstack-cinder&distro=SUSE OpenStack Cloud 8

pkg:rpm/suse/openstack-cinder&distro=SUSE%20OpenStack%20Cloud%208

Vulnerabilities (86)

  • CVE-2017-7466Jun 22, 2018
    affected < 11.2.3~dev29-3.28.2fixed 11.2.3~dev29-3.28.2

    Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbi

  • CVE-2016-9587Apr 24, 2018
    affected < 11.2.3~dev29-3.28.2fixed 11.2.3~dev29-3.28.2

    Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use thi

  • CVE-2017-17051HigDec 5, 2017
    affected < 11.2.3~dev7-3.18.2fixed 11.2.3~dev7-3.18.2

    An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This

  • CVE-2017-7550CriNov 21, 2017
    affected < 11.2.3~dev29-3.28.2fixed 11.2.3~dev29-3.28.2

    A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords t

  • CVE-2016-10127CriMar 3, 2017
    affected < 11.2.3~dev16-3.21.4fixed 11.2.3~dev16-3.21.4

    PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.

  • CVE-2015-3448Apr 29, 2015
    affected < 11.2.3~dev7-3.18.2fixed 11.2.3~dev7-3.18.2

    REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.

Page 5 of 5