Show filters
128 Total Results
Displaying 51-60 of 128
Sort by:
Attacker Value
Unknown

CVE-2016-2121

Disclosure Date: October 31, 2018 (last updated November 27, 2024)
A permissions flaw was found in redis, which sets weak permissions on certain files and directories that could potentially contain sensitive information. A local, unprivileged user could possibly use this flaw to access unauthorized system information.
0
Attacker Value
Unknown

CVE-2018-18438

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
0
Attacker Value
Unknown

CVE-2018-17963

Disclosure Date: October 09, 2018 (last updated November 27, 2024)
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
Attacker Value
Unknown

CVE-2018-17204

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Attacker Value
Unknown

CVE-2018-17206

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
Attacker Value
Unknown

CVE-2018-17205

Disclosure Date: September 19, 2018 (last updated November 27, 2024)
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
0
Attacker Value
Unknown

CVE-2018-14635

Disclosure Date: September 10, 2018 (last updated November 27, 2024)
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
0
Attacker Value
Unknown

CVE-2017-15139

Disclosure Date: August 27, 2018 (last updated November 27, 2024)
A vulnerability was found in openstack-cinder releases up to and including Queens, allowing newly created volumes in certain storage volume configurations to contain previous data. It specifically affects ScaleIO volumes using thin volumes and zero padding. This could lead to leakage of sensitive information between tenants.
Attacker Value
Unknown

CVE-2017-2627

Disclosure Date: August 22, 2018 (last updated November 27, 2024)
A flaw was found in openstack-tripleo-common as shipped with Red Hat Openstack Enterprise 10 and 11. The sudoers file as installed with OSP's openstack-tripleo-common package is much too permissive. It contains several lines for the mistral user that have wildcards that allow directory traversal with '..' and it grants full passwordless root access to the validations user.
0
Attacker Value
Unknown

CVE-2018-14432

Disclosure Date: July 31, 2018 (last updated November 27, 2024)
In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
0