Red Hat OpenStack 16.1

CPE Details

Red Hat OpenStack 16.1
16.1
2020-12-22
15h18 +00:00
2020-12-22
15h18 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

openstack

Version

16.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-3101 2023-03-22 23h00 +00:00 A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file, leading to information disclosure of important configuration details from the OpenStack deployment.
5.5
Medium
CVE-2022-3146 2023-03-22 23h00 +00:00 A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
5.5
Medium
CVE-2022-4134 2023-03-05 23h00 +00:00 A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images.
2.8
Low
CVE-2022-3100 2023-01-17 23h00 +00:00 A flaw was found in the openstack-barbican component. This issue allows an access policy bypass via a query string when accessing the API.
5.9
Medium
CVE-2022-2447 2022-09-01 18h30 +00:00 A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
6.6
Medium
CVE-2021-4180 2022-03-23 18h46 +00:00 An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.
4.3
Medium
CVE-2021-3620 2022-03-03 18h23 +00:00 A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
5.5
Medium
CVE-2016-2124 2022-02-17 23h00 +00:00 A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
5.9
Medium
CVE-2020-25717 2022-02-17 23h00 +00:00 A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
8.1
High
CVE-2021-31918 2021-05-06 14h23 +00:00 A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
7.5
High
CVE-2020-14355 2020-10-07 12h41 +00:00 Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
6.6
Medium
CVE-2020-9490 2020-08-07 13h24 +00:00 Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
7.5
High