Filtered by vendor Ovirt
Subscribe
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-0847 | 4 Fedoraproject, Linux, Ovirt and 1 more | 19 Fedora, Linux Kernel, Ovirt-engine and 16 more | 2024-07-02 | 7.2 HIGH | 7.8 HIGH |
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. | |||||
CVE-2024-0822 | 1 Ovirt | 1 Ovirt-engine | 2024-02-21 | N/A | 7.5 HIGH |
An authentication bypass vulnerability was found in overt-engine. This flaw allows the creation of users in the system without authentication due to a flaw in the CreateUserSession command. | |||||
CVE-2022-2806 | 2 Ovirt, Sos Project | 2 Log Collector, Sos | 2024-02-04 | N/A | 5.5 MEDIUM |
It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev | |||||
CVE-2022-0207 | 2 Ovirt, Redhat | 5 Vdsm, Enterprise Linux, Virtualization and 2 more | 2024-02-04 | N/A | 4.7 MEDIUM |
A race condition was found in vdsm. Functionality to obfuscate sensitive values in log files that may lead to values being stored in clear text. | |||||
CVE-2022-0435 | 5 Fedoraproject, Linux, Netapp and 2 more | 37 Fedora, Linux Kernel, H300e and 34 more | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network. | |||||
CVE-2020-35497 | 2 Ovirt, Redhat | 2 Ovirt-engine, Virtualization | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
A flaw was found in ovirt-engine 4.4.3 and earlier allowing an authenticated user to read other users' personal information, including name, email and public SSH key. | |||||
CVE-2019-19336 | 2 Ovirt, Redhat | 2 Ovirt-engine, Virtualization | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability was reported in the oVirt-engine's OAuth authorization endpoint before version 4.3.8. URL parameters were included in the HTML response without escaping. This flaw would allow an attacker to craft malicious HTML pages that can run scripts in the context of the user's oVirt session. | |||||
CVE-2020-14333 | 1 Ovirt | 1 Ovirt-engine | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A flaw was found in Ovirt Engine's web interface in ovirt 4.4 and earlier, where it did not filter user-controllable parameters completely, resulting in a reflected cross-site scripting attack. This flaw allows an attacker to leverage a phishing attack, steal an unsuspecting user's cookies or other confidential information, or impersonate them within the application's context. | |||||
CVE-2013-4367 | 2 Linux, Ovirt | 2 Linux Kernel, Ovirt-engine | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
ovirt-engine 3.2 running on Linux kernel 3.1 and newer creates certain files world-writeable due to an upstream kernel change which impacted how python's os.chmod() works when passed a mode of '-1'. | |||||
CVE-2012-5518 | 1 Ovirt | 1 Vdsm | 2024-02-04 | 4.3 MEDIUM | 7.5 HIGH |
vdsm: certificate generation upon node creation allowing vdsm to start and serve requests from anyone who has a matching key (and certificate) | |||||
CVE-2012-4480 | 2 Fedoraproject, Ovirt | 2 Fedora, Mom | 2024-02-04 | 4.6 MEDIUM | 7.8 HIGH |
mom creates world-writable pid files in /var/run | |||||
CVE-2013-0293 | 1 Ovirt | 1 Node | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
oVirt Node: Lock screen accepts F2 to drop to shell causing privilege escalation | |||||
CVE-2019-10194 | 2 Ovirt, Redhat | 2 Ovirt, Virtualization Manager | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Sensitive passwords used in deployment and configuration of oVirt Metrics, all versions. were found to be insufficiently protected. Passwords could be disclosed in log files (if playbooks are run with -v) or in playbooks stored on Metrics or Bastion hosts. | |||||
CVE-2019-3831 | 2 Ovirt, Redhat | 2 Vdsm, Gluster Storage | 2024-02-04 | 9.0 HIGH | 6.7 MEDIUM |
A vulnerability was discovered in vdsm, version 4.19 through 4.30.3 and 4.30.5 through 4.30.8. The systemd_run function exposed to the vdsm system user could be abused to execute arbitrary commands as root. | |||||
CVE-2019-10139 | 1 Ovirt | 1 Cockpit-ovirt | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted. | |||||
CVE-2019-3879 | 2 Ovirt, Redhat | 2 Ovirt, Virtualization | 2024-02-04 | 5.5 MEDIUM | 8.1 HIGH |
It was discovered that in the ovirt's REST API before version 4.3.2.1, RemoveDiskCommand is triggered as an internal command, meaning the permission validation that should be performed against the calling user is skipped. A user with low privileges (eg Basic Operations) could exploit this flaw to delete disks attached to guests. | |||||
CVE-2018-10908 | 2 Ovirt, Redhat | 2 Vdsm, Virtualization | 2024-02-04 | 7.1 HIGH | 6.3 MEDIUM |
It was found that vdsm before version 4.20.37 invokes qemu-img on untrusted inputs without limiting resources. By uploading a specially crafted image, an attacker could cause the qemu-img process to consume unbounded amounts of memory of CPU time, causing a denial of service condition that could potentially impact other users of the host. | |||||
CVE-2017-15113 | 2 Ovirt, Redhat | 2 Ovirt, Virtualization | 2024-02-04 | 3.5 LOW | 6.6 MEDIUM |
ovirt-engine before version 4.1.7.6 with log level set to DEBUG includes passwords in the log file without masking. Only administrators can change the log level and only administrators can access the logs. This presents a risk when debug-level logs are shared with vendors or other parties to troubleshoot issues. | |||||
CVE-2018-1000018 | 1 Ovirt | 1 Ovirt-hosted-engine-setup | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
An information disclosure in ovirt-hosted-engine-setup prior to 2.2.7 reveals the root user's password in the log file. | |||||
CVE-2018-1075 | 1 Ovirt | 1 Ovirt | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
ovirt-engine up to version 4.2.3 is vulnerable to an unfiltered password when choosing manual db provisioning. When engine-setup was run and one chooses to provision the database manually or connect to a remote database, the password input was logged in cleartext during the verification step. Sharing the provisioning log might inadvertently leak database passwords. |