Show filters
53 Total Results
Displaying 11-20 of 53
Sort by:
Attacker Value
Unknown

CVE-2024-4840

Disclosure Date: May 14, 2024 (last updated November 25, 2024)
An flaw was found in the OpenStack Platform (RHOSP) director, a toolset for installing and managing a complete RHOSP environment. Plaintext passwords may be stored in log files, which can expose sensitive information to anyone with access to the logs.
0
Attacker Value
Unknown

CVE-2024-4438

Disclosure Date: May 08, 2024 (last updated July 25, 2024)
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2023-39325/CVE-2023-44487, known as Rapid Reset. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
0
Attacker Value
Unknown

CVE-2024-4437

Disclosure Date: May 08, 2024 (last updated July 25, 2024)
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2021-44716. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
0
Attacker Value
Unknown

CVE-2024-4436

Disclosure Date: May 08, 2024 (last updated July 25, 2024)
The etcd package distributed with the Red Hat OpenStack platform has an incomplete fix for CVE-2022-41723. This issue occurs because the etcd package in the Red Hat OpenStack platform is using http://golang.org/x/net/http2 instead of the one provided by Red Hat Enterprise Linux versions, meaning it should be updated at compile time instead.
0
Attacker Value
Unknown

CVE-2024-1394

Disclosure Date: March 21, 2024 (last updated August 21, 2024)
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs​. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey​ and ctx​. That function uses named return parameters to free pkey​ and ctx​ if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey​ and ctx​ will be nil inside the deferred function that should free them.
0
Attacker Value
Unknown

CVE-2023-6725

Disclosure Date: March 15, 2024 (last updated July 25, 2024)
An access-control flaw was found in the OpenStack Designate component where private configuration information including access keys to BIND were improperly made world readable. A malicious attacker with access to any container could exploit this flaw to access sensitive information.
0
Attacker Value
Unknown

CVE-2023-5625

Disclosure Date: November 01, 2023 (last updated July 04, 2024)
A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
Attacker Value
Unknown

CVE-2023-1636

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.
Attacker Value
Unknown

CVE-2023-1633

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.
Attacker Value
Unknown

CVE-2023-1625

Disclosure Date: September 24, 2023 (last updated October 08, 2023)
An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.