Hashicorp Nomad 0.2.3 - Edition

CPE Details

Hashicorp Nomad 0.2.3 - Edition
0.2.3
2020-02-19 20:34 +00:00
2020-02-19 20:34 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:hashicorp:nomad:0.2.3:*:*:*:-:*:*:*

Informations

Vendor

hashicorp

Product

nomad

Version

0.2.3

Software Edition

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-0821 2023-02-16 21:23 +00:00 HashiCorp Nomad and Nomad Enterprise 1.2.15 up to 1.3.8, and 1.4.3 jobs using a maliciously compressed artifact stanza source can cause excessive disk usage. Fixed in 1.2.16, 1.3.9, and 1.4.4.
6.5
MEDIUM
CVE-2022-30324 2022-05-27 12:48 +00:00 HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 were impacted by go-getter vulnerabilities enabling privilege escalation through the artifact stanza in submitted jobs onto the client agent host. Fixed in 1.1.14, 1.2.8, and 1.3.1.
9.8
CRITICAL
CVE-2021-37218 2021-09-07 09:40 +00:00 HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
8.8
HIGH
CVE-2021-32575 2021-06-17 16:28 +00:00 HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
6.5
MEDIUM
CVE-2021-3283 2021-02-01 14:36 +00:00 HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.
7.5
HIGH
CVE-2020-7956 2020-01-31 11:43 +00:00 HashiCorp Nomad and Nomad Enterprise up to 0.10.2 incorrectly validated role/region associated with TLS certificates used for mTLS RPC, and were susceptible to privilege escalation. Fixed in 0.10.3.
9.8
CRITICAL
CVE-2020-7218 2020-01-31 11:26 +00:00 HashiCorp Nomad and Nonad Enterprise up to 0.10.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 0.10.3.
7.5
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.