Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Gluster_storage
(Redhat)Repositories |
• git://git.openssl.org/openssl.git
• https://github.com/ansible/ansible |
#Vulnerabilities | 25 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-11-24 | CVE-2020-10763 | An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information. This flaw allows an attacker with local access to the Heketi server to read potentially sensitive information such as gluster-block passwords. | Heketi, Enterprise_linux, Gluster_storage, Openshift_container_platform | 5.5 | ||
2019-03-25 | CVE-2019-3831 | A vulnerability was discovered in vdsm, version 4.19 through 4.30.3 and 4.30.5 through 4.30.8. The systemd_run function exposed to the vdsm system user could be abused to execute arbitrary commands as root. | Vdsm, Gluster_storage | 6.7 | ||
2018-09-11 | CVE-2018-1127 | Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user. | Gluster_storage | 8.1 | ||
2015-11-25 | CVE-2015-5242 | OpenStack Swift-on-File (aka Swiftonfile) does not properly restrict use of the pickle Python module when loading metadata, which allows remote authenticated users to execute arbitrary code via a crafted extended attribute (xattrs). | Gluster_storage | N/A |