VYPR

rpm package

suse/release-notes-hpe-helion-openstack&distro=HPE Helion OpenStack 8

pkg:rpm/suse/release-notes-hpe-helion-openstack&distro=HPE%20Helion%20OpenStack%208

Vulnerabilities (67)

  • CVE-2019-14858Oct 14, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub par

  • CVE-2019-14846Oct 8, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not af

  • CVE-2019-15043Sep 3, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.

  • CVE-2019-5477Aug 16, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input a

  • CVE-2019-10156Jul 30, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any

  • CVE-2018-11779Jul 25, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.

  • CVE-2019-0202Jul 25, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpo

  • CVE-2019-13611Jul 15, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.

  • CVE-2019-2628Apr 23, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compr

  • CVE-2019-2627Apr 23, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with networ

  • CVE-2019-2614Apr 23, 2019
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network acces

  • CVE-2019-3828Mar 27, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.

  • CVE-2018-16876Jan 3, 2019
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.

  • CVE-2018-19039Dec 13, 2018
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.

  • CVE-2018-16859Nov 29, 2018
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the

  • CVE-2018-16837Oct 23, 2018
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which h

  • CVE-2018-15727Aug 29, 2018
    affected < 8.20190911-3.20.3fixed 8.20190911-3.20.3

    Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.

  • CVE-2016-8614Jul 31, 2018
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

  • CVE-2016-8628Jul 31, 2018
    affected < 8.20200922-3.23.1fixed 8.20200922-3.23.1

    Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.

  • CVE-2016-8611Jul 31, 2018
    affected < 8.20201214-3.29.1fixed 8.20201214-3.29.1

    A vulnerability was found in Openstack Glance. No limits are enforced within the Glance image service for both v1 and v2 `/images` API POST method for authenticated users, resulting in possible denial of service attacks through database table saturation.