rpm package
suse/python-pysaml2&distro=SUSE OpenStack Cloud Crowbar 8
pkg:rpm/suse/python-pysaml2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208
Vulnerabilities (48)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-10663 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Apr 28, 2020 | The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, | ||
| CVE-2020-12052 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Apr 27, 2020 | Grafana version < 6.7.3 is vulnerable for annotation popup XSS. | ||
| CVE-2019-16792 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jan 22, 2020 | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. | ||
| CVE-2020-5390 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jan 13, 2020 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus | ||
| CVE-2019-19911 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jan 5, 2020 | There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho | ||
| CVE-2020-5312 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jan 3, 2020 | libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | ||
| CVE-2020-5313 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jan 3, 2020 | libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. | ||
| CVE-2019-16789 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Dec 26, 2019 | In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain | ||
| CVE-2019-16785 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Dec 20, 2019 | Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if | ||
| CVE-2019-16786 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Dec 20, 2019 | Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ | ||
| CVE-2019-18874 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Nov 12, 2019 | psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object. | ||
| CVE-2019-16865 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Oct 4, 2019 | An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image. | ||
| CVE-2019-15043 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Sep 3, 2019 | In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana. | ||
| CVE-2019-5477 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Aug 16, 2019 | A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input a | ||
| CVE-2019-1010083 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Jul 17, 2019 | The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656. | ||
| CVE-2019-13611 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Jul 15, 2019 | An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted. | ||
| CVE-2019-2628 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Apr 23, 2019 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compr | ||
| CVE-2019-2627 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Apr 23, 2019 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with networ | ||
| CVE-2019-2614 | — | < 4.0.2-5.3.3 | 4.0.2-5.3.3 | Apr 23, 2019 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces | ||
| CVE-2019-3828 | — | < 4.0.2-5.6.1 | 4.0.2-5.6.1 | Mar 27, 2019 | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. |
- CVE-2020-10663Apr 28, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically,
- CVE-2020-12052Apr 27, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
Grafana version < 6.7.3 is vulnerable for annotation popup XSS.
- CVE-2019-16792Jan 22, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally.
- CVE-2020-5390Jan 13, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus
- CVE-2019-19911Jan 5, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. Ho
- CVE-2020-5312Jan 3, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
- CVE-2020-5313Jan 3, 2020affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
- CVE-2019-16789Dec 26, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain
- CVE-2019-16785Dec 20, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if
- CVE-2019-16786Dec 20, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ
- CVE-2019-18874Nov 12, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
- CVE-2019-16865Oct 4, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
- CVE-2019-15043Sep 3, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.
- CVE-2019-5477Aug 16, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input a
- CVE-2019-1010083Jul 17, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656.
- CVE-2019-13611Jul 15, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
- CVE-2019-2628Apr 23, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compr
- CVE-2019-2627Apr 23, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with networ
- CVE-2019-2614Apr 23, 2019affected < 4.0.2-5.3.3fixed 4.0.2-5.3.3
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces
- CVE-2019-3828Mar 27, 2019affected < 4.0.2-5.6.1fixed 4.0.2-5.6.1
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
Page 2 of 3