rpm package
suse/venv-openstack-murano&distro=SUSE OpenStack Cloud 8
pkg:rpm/suse/venv-openstack-murano&distro=SUSE%20OpenStack%20Cloud%208
Vulnerabilities (147)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-7550 | Cri | 9.8 | < 4.0.2~dev2-12.24.1 | 4.0.2~dev2-12.24.1 | Nov 21, 2017 | A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords t | |
| CVE-2017-1000246 | Med | 5.3 | < 4.0.2~dev2-12.22.1 | 4.0.2~dev2-12.22.1 | Nov 17, 2017 | Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data. | |
| CVE-2017-5637 | Hig | 7.5 | < 4.0.2~dev2-12.20.1 | 4.0.2~dev2-12.20.1 | Oct 10, 2017 | Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, f | |
| CVE-2017-11499 | Hig | 7.5 | < 4.0.2~dev2-12.28.3 | 4.0.2~dev2-12.28.3 | Jul 25, 2017 | Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building | |
| CVE-2017-5929 | Cri | 9.8 | < 4.0.2~dev2-12.28.3 | 4.0.2~dev2-12.28.3 | Mar 13, 2017 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. | |
| CVE-2016-10127 | Cri | 9.0 | < 4.0.2~dev2-12.16.2 | 4.0.2~dev2-12.16.2 | Mar 3, 2017 | PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response. | |
| CVE-2015-3448 | — | < 4.0.2~dev2-12.14.1 | 4.0.2~dev2-12.14.1 | Apr 29, 2015 | REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log. |
- affected < 4.0.2~dev2-12.24.1fixed 4.0.2~dev2-12.24.1
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords t
- affected < 4.0.2~dev2-12.22.1fixed 4.0.2~dev2-12.22.1
Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
- affected < 4.0.2~dev2-12.20.1fixed 4.0.2~dev2-12.20.1
Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, f
- affected < 4.0.2~dev2-12.28.3fixed 4.0.2~dev2-12.28.3
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building
- affected < 4.0.2~dev2-12.28.3fixed 4.0.2~dev2-12.28.3
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.
- affected < 4.0.2~dev2-12.16.2fixed 4.0.2~dev2-12.16.2
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.
- CVE-2015-3448Apr 29, 2015affected < 4.0.2~dev2-12.14.1fixed 4.0.2~dev2-12.14.1
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
Page 8 of 8