Latest redhat openstack platform Vulnerabilities

Prefix Truncation Attacks in SSH Specification (Terrapin Attack)
pip/paramiko>=2.5.0<3.4.0
go/golang.org/x/crypto<0.17.0
rust/russh<0.40.2
Apple macOS Sonoma<14.4
Openbsd Openssh<9.6
Putty Putty<0.80
and 128 more
Python-eventlet: patch regression for cve-2021-21419 in some red hat builds
Redhat Openshift Container Platform For Arm64=4.12
Redhat Openshift Container Platform For Linuxone=4.12
Redhat Openshift Container Platform For Power=4.12
Redhat Openshift Container Platform Ibm Z Systems=4.12
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
and 2 more
- Rapid Reset HTTP/2 vulnerability
Microsoft Windows 11=21H2
Microsoft Windows 11=21H2
Microsoft Windows Server 2022
Microsoft Windows Server 2022
Microsoft Windows 11=22H2
Microsoft Windows 11=22H2
and 556 more
Openstack-neutron: unrestricted creation of security groups (fix for cve-2022-3277)
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.2
Improper i/o watch removal in tls handshake can lead to remote unauthenticated denial of service
QEMU qemu
Redhat Openstack Platform=13.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
and 8 more
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, US...
OpenStack Barbican
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
Redhat Openstack Platform=17.0
A barbican configuration file is set to world-readable in Red Hat OpenStack. This presents a security risk as it allows authenticated attacker with limited access to the file to view its contents, inc...
OpenStack Barbican
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
Redhat Openstack Platform=17.0
pip/barbican<=16.0.0
An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. ...
openstack heat
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
Redhat Openstack Platform=17.0
pip/openstack-heat<20.0.0
and 4 more
Undertow: infinite loop in sslconduit during close
redhat/eap7-undertow<0:2.2.22-1.SP3_redhat_00002.1.el8ea
redhat/eap7-wildfly<0:7.4.9-6.GA_redhat_00004.1.el8ea
redhat/eap7-undertow<0:2.2.23-1.SP2_redhat_00001.1.el8ea
redhat/eap7-undertow-jastow<0:2.0.14-1.Final_redhat_00001.1.el8ea
redhat/eap7-undertow<0:2.2.22-1.SP3_redhat_00002.1.el9ea
redhat/eap7-wildfly<0:7.4.9-6.GA_redhat_00004.1.el9ea
and 54 more
A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
OpenStack Barbican
Redhat Openstack=13
Redhat Openstack=16.1
Redhat Openstack=16.2
Redhat Openstack=17
Redhat Openstack For Ibm Power=13
and 4 more
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel ...
debian/openvswitch<=2.15.0+ds1-2<=3.1.0-1
Cloudbase Open Vswitch>=1.5.0<2.13.11
Cloudbase Open Vswitch>=2.14.0<2.14.9
Cloudbase Open Vswitch>=2.15.0<2.15.8
Cloudbase Open Vswitch>=2.16.0<2.16.7
Cloudbase Open Vswitch>=2.17.0<2.17.6
and 22 more
Instack-undercloud: rsync leaks information to undercloud
Redhat Openstack Platform=13.0
Redhat Openstack Platform=13.0
redhat/instack-undercloud<0:8.4.9-13.el7
Upstream bug description: When a non-admin user tries to list security groups for project_id "None", Neutron creates a default security group for that project and returns an empty list to the caller. ...
OpenStack Neutron<18.6.0
OpenStack Neutron>=19.0.0<19.5.0
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
A flaw was found in OpenStack. Multiple components show plain-text passwords in /var/log/messages during the OpenStack overcloud update run, leading to a disclosure of sensitive information problem.
Redhat Openstack Platform=16.2
Description of problem: Keystone issues tokens with the default lifespan regardless of the lifespan of the application credentials used to issue them. If the configured lifespan of an identity token i...
OpenStack Keystone
Redhat Openstack=16.1
Redhat Openstack=16.2
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
Redhat Quay=3.0.0
and 1 more
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
redhat/dpdk<21.11
redhat/dpdk<20.11
redhat/dpdk<19.11
redhat/openvswitch2.11<0:2.11.3-96.2.el7fd
redhat/openvswitch2.16<0:2.16.0-89.2.el8fd
redhat/openvswitch2.17<0:2.17.0-37.3.el8fd
and 25 more
This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.e...
redhat/eap7-wildfly<0:7.4.5-3.GA_redhat_00001.1.el8ea
redhat/eap7-wildfly<0:7.4.5-3.GA_redhat_00001.1.el7ea
redhat/rh-sso7-keycloak<0:15.0.8-1.redhat_00001.1.el7
redhat/rh-sso7-keycloak<0:15.0.8-1.redhat_00001.1.el8
redhat/rh-sso7-keycloak<0:18.0.3-1.redhat_00001.1.el7
redhat/rh-sso7-keycloak<0:18.0.3-1.redhat_00001.1.el8
and 6 more
A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quo...
Openstack Oslo.utils<4.10.1
Openstack Oslo.utils=4.12.0
Redhat Openshift Container Platform=4.0
Redhat Openstack Platform=16.1
Debian Debian Linux=10.0
Debian Debian Linux=11.0
and 4 more
The default policy for adding a secret to a container allows anyone with the "admin" role to add a secret their project owns to a container that is owned by a different project. References: <a class...
OpenStack Barbican<14.0.0
Redhat Openstack Platform=16.1
An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless...
OpenStack Barbican<14.0.0
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker a...
redhat/ceph<2:14.2.22-110.el7c
redhat/ceph<2:16.2.7-98.el8c
ubuntu/ceph<12.2.13-0ubuntu0.18.04.11
ubuntu/ceph<15.2.17-0ubuntu0.20.04.3
ubuntu/ceph<16.2.9+
Redhat Ceph Storage=3.0
and 22 more
The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
QEMU qemu
Debian Debian Linux=9.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Fedoraproject Fedora=30
Redhat Openstack Platform=10.0
and 4 more
A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. T...
OpenStack Keystone
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Redhat Openstack Platform=10.0
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.1
and 3 more
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
OpenStack Nova<21.2.3
OpenStack Nova>=22.0.0<22.2.3
OpenStack Nova>=23.0.0<23.0.3
Redhat Openstack Platform=16.1
Redhat Openstack Platform=16.2
redhat/nova<21.2.3
and 2 more
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonat...
OpenStack Neutron<16.3.3
OpenStack Neutron>=17.0.0<17.1.3
OpenStack Neutron=18.0.0
Redhat Openstack Platform=10.0
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.1
and 14 more
An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized wit...
QEMU qemu<6.2.0
Fedoraproject Fedora=33
Redhat Openstack Platform=10.0
Redhat Openstack Platform=13.0
Redhat Enterprise Linux=6.0
Redhat Enterprise Linux=8.0
and 16 more
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the Q...
QEMU qemu=6.1.50
Fedoraproject Extra Packages For Enterprise Linux=7.0
Fedoraproject Fedora=33
Fedoraproject Fedora=37
Redhat Openstack Platform=10.0
Redhat Openstack Platform=13.0
and 9 more
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only ...
redhat/automation-hub<0:4.2.2-1.el7
redhat/python3-django<0:2.2.18-1.el7
redhat/python-bleach<0:3.3.0-1.el7
redhat/python-bleach-allowlist<0:1.0.3-1.el7
redhat/python-galaxy-importer<0:0.2.15-1.el7
redhat/python-galaxy-ng<0:4.2.2-1.el7
and 37 more
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to a...
redhat/ceph<2:12.2.12-139.el7c
redhat/ceph-ansible<0:3.2.56-1.el7c
redhat/cephmetrics<0:2.0.10-1.el7c
redhat/grafana<0:5.2.4-3.el7c
redhat/tcmu-runner<0:1.4.0-3.el7c
redhat/ceph<2:14.2.11-95.el7c
and 11 more
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Python-rsa Project Python-rsa>=2.1<4.7
Redhat Openstack Platform=13.0
Redhat Openstack Platform=16.0
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
and 3 more
A null pointer dereference issue was found in the IDE disk emulator of QEMU. It could occur while cancelling an i/o operation via ide_cancel_dma_sync() routine, if a block drive pointer is null. A gue...
redhat/QEMU<5.1.1
QEMU qemu<5.1.1
Redhat Openstack Platform=13.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=8.0
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during i...
pip/ansible>=2.9.0<2.9.13
pip/ansible<2.8.15
debian/ansible
redhat/ansible-engine<2.8.15
redhat/ansible-engine<2.9.13
Redhat Ansible Engine>=2.8.0<=2.8.15
and 9 more
A flaw was found in the nova_libvirt container provided by the Red Hat OpenStack Platform 16, where it does not have SELinux enabled. This flaw causes sVirt, an important isolation mechanism, to be di...
Redhat Openstack Platform=15.0
Redhat Openstack Platform=16.0
Redhat Openstack Platform=16.1
redhat/openstack-tripleo-heat-templates<11.3.2
redhat/openstack-tripleo-heat-templates<10.6.3
An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or mo...
redhat/openstack-selinux<0.8.24
Redhat Openstack-selinux<0.8.24
Redhat Openstack Platform=15.0
Redhat Openstack Platform=16.1

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203