Red Hat Virtualization 4.1

CPE Details

Red Hat Virtualization 4.1
4.1
2020-10-15
11h28 +00:00
2020-10-15
11h28 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

virtualization

Version

4.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2017-15113 2018-07-27 14h00 +00:00 ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues.
7.2
High
CVE-2016-8647 2018-07-26 12h00 +00:00 An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
4.9
Medium
CVE-2017-7481 2018-07-19 11h00 +00:00 Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
9.8
Critical
CVE-2018-1059 2018-04-24 18h00 +00:00 The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
6.1
Medium
CVE-2018-7750 2018-03-13 17h00 +00:00 transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
9.8
Critical
CVE-2017-9214 2017-05-23 15h00 +00:00 In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
9.8
Critical