Security
Headlines
HeadlinesLatestCVEs

Tag

#aws

CVE-2015-3241: Red Hat Customer Portal - Access to 24x7 support and knowledge

A denial of service flaw was found in the OpenStack Compute (nova) instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance.

CVE
#vulnerability#web#mac#linux#red_hat#dos#nodejs#js#java#kubernetes#aws#auth
CVE-2015-3239: Red Hat Customer Portal - Access to 24x7 support and knowledge

An off-by-one array indexing error was found in the libunwind API, which could cause an error when reading untrusted binaries or dwarf debug info data. Red Hat products do not call the API in this way; and it is unlikely that any exploitable attack vector exists in current builds or supported usage.

CVE-2014-0202: Red Hat Customer Portal - Access to 24x7 support and knowledge

The setup script in ovirt-engine-dwh, as used in the Red Hat Enterprise Virtualization Manager data warehouse (rhevm-dwh) package before 3.3.3, stores the history database password in cleartext, which allows local users to obtain sensitive information by reading an unspecified file.

CVE-2014-0201: Red Hat Customer Portal - Access to 24x7 support and knowledge

ovirt-engine-reports, as used in the Red Hat Enterprise Virtualization reports package (rhevm-reports) before 3.3.3, uses world-readable permissions on configuration files, which allows local users to obtain sensitive information by reading the files.

CVE-2014-0188: Red Hat Customer Portal - Access to 24x7 support and knowledge

The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to a passthrough trigger.

CVE-2012-0818: Red Hat Customer Portal - Access to 24x7 support and knowledge

RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.