VYPR

rpm package

suse/zookeeper&distro=HPE Helion OpenStack 8

pkg:rpm/suse/zookeeper&distro=HPE%20Helion%20OpenStack%208

Vulnerabilities (13)

  • CVE-2022-23307Jan 18, 2022
    affected < 3.4.10-3.15.1fixed 3.4.10-3.15.1

    CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

  • CVE-2022-23305Jan 18, 2022
    affected < 3.4.10-3.15.1fixed 3.4.10-3.15.1

    By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering

  • CVE-2022-23302Jan 18, 2022
    affected < 3.4.10-3.15.1fixed 3.4.10-3.15.1

    JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBi

  • CVE-2021-4104Dec 14, 2021
    affected < 3.4.10-3.9.1fixed 3.4.10-3.9.1

    JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests t

  • CVE-2020-9543Mar 12, 2020
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, update, delete, or share resources that do not belong to them, because of a context-free lookup of a UUID. Attackers may also create resources, such as shared file systems and groups of shares o

  • CVE-2020-5247Feb 28, 2020
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir

  • CVE-2019-15026Aug 30, 2019
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.

  • CVE-2019-0201May 23, 2019
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuth

  • CVE-2019-11596Apr 29, 2019
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.

  • CVE-2019-3871Mar 21, 2019
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of

  • CVE-2018-14626Nov 29, 2018
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.

  • CVE-2018-10851Nov 29, 2018
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.

  • CVE-2017-5637HigOct 10, 2017
    affected < 3.4.10-3.6.1fixed 3.4.10-3.6.1

    Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, f