rpm package
suse/release-notes-suse-openstack-cloud&distro=SUSE OpenStack Cloud Crowbar 9
pkg:rpm/suse/release-notes-suse-openstack-cloud&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
Vulnerabilities (56)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-5313 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Jan 3, 2020 | libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. | ||
| CVE-2019-16789 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Dec 26, 2019 | In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain | ||
| CVE-2019-16785 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Dec 20, 2019 | Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if | ||
| CVE-2019-16786 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Dec 20, 2019 | Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ | ||
| CVE-2019-19844 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Dec 18, 2019 | Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token fo | ||
| CVE-2019-18874 | — | < 9.20191025-3.15.1 | 9.20191025-3.15.1 | Nov 12, 2019 | psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object. | ||
| CVE-2019-17134 | — | < 9.20191025-3.15.1 | 9.20191025-3.15.1 | Oct 8, 2019 | Amphora Images in OpenStack Octavia >=0.10.0 <2.1.2, >=3.0.0 <3.2.0, >=4.0.0 <4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent | ||
| CVE-2019-16865 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Oct 4, 2019 | An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image. | ||
| CVE-2019-15026 | — | < 9.20200319-3.18.1 | 9.20200319-3.18.1 | Aug 30, 2019 | memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c. | ||
| CVE-2019-0201 | — | < 9.20200319-3.18.1 | 9.20200319-3.18.1 | May 23, 2019 | An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth | ||
| CVE-2019-11596 | — | < 9.20200319-3.18.1 | 9.20200319-3.18.1 | Apr 29, 2019 | In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | ||
| CVE-2016-10745 | — | < 9.20200917-3.24.3 | 9.20200917-3.24.3 | Apr 8, 2019 | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | ||
| CVE-2019-10906 | — | < 9.20200917-3.24.3 | 9.20200917-3.24.3 | Apr 6, 2019 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | ||
| CVE-2019-3828 | — | < 9.20200610-3.21.4 | 9.20200610-3.21.4 | Mar 27, 2019 | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. | ||
| CVE-2019-8341 | — | < 9.20200917-3.24.3 | 9.20200917-3.24.3 | Feb 15, 2019 | An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: | ||
| CVE-2018-19787 | — | < 9.20220413-3.30.1 | 9.20220413-3.30.1 | Dec 2, 2018 | An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar |
- CVE-2020-5313Jan 3, 2020affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
- CVE-2019-16789Dec 26, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests contain
- CVE-2019-16785Dec 20, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if
- CVE-2019-16786Dec 20, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separ
- CVE-2019-19844Dec 18, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token fo
- CVE-2019-18874Nov 12, 2019affected < 9.20191025-3.15.1fixed 9.20191025-3.15.1
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
- CVE-2019-17134Oct 8, 2019affected < 9.20191025-3.15.1fixed 9.20191025-3.15.1
Amphora Images in OpenStack Octavia >=0.10.0 <2.1.2, >=3.0.0 <3.2.0, >=4.0.0 <4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent
- CVE-2019-16865Oct 4, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
- CVE-2019-15026Aug 30, 2019affected < 9.20200319-3.18.1fixed 9.20200319-3.18.1
memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
- CVE-2019-0201May 23, 2019affected < 9.20200319-3.18.1fixed 9.20200319-3.18.1
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth
- CVE-2019-11596Apr 29, 2019affected < 9.20200319-3.18.1fixed 9.20200319-3.18.1
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
- CVE-2016-10745Apr 8, 2019affected < 9.20200917-3.24.3fixed 9.20200917-3.24.3
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
- CVE-2019-10906Apr 6, 2019affected < 9.20200917-3.24.3fixed 9.20200917-3.24.3
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
- CVE-2019-3828Mar 27, 2019affected < 9.20200610-3.21.4fixed 9.20200610-3.21.4
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
- CVE-2019-8341Feb 15, 2019affected < 9.20200917-3.24.3fixed 9.20200917-3.24.3
An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE:
- CVE-2018-19787Dec 2, 2018affected < 9.20220413-3.30.1fixed 9.20220413-3.30.1
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar
Page 3 of 3