Total vulnerabilities in the database
Impala in CDH 5.2.0 through 5.7.2 and 5.8.0 allows remote attackers to bypass Setry authorization.
Software | From | Fixed in |
---|---|---|
cloudera / cdh | 5.3.6 | 5.3.6.x |
cloudera / cdh | 5.3.1 | 5.3.1.x |
cloudera / cdh | 5.2.6 | 5.2.6.x |
cloudera / cdh | 5.3.3 | 5.3.3.x |
cloudera / cdh | 5.5.3 | 5.5.3.x |
cloudera / cdh | 5.3.10 | 5.3.10.x |
cloudera / cdh | 5.3.7 | 5.3.7.x |
cloudera / cdh | 5.3.5 | 5.3.5.x |
cloudera / cdh | 5.3.0 | 5.3.0.x |
cloudera / cdh | 5.6.0 | 5.6.0.x |
cloudera / cdh | 5.4.7 | 5.4.7.x |
cloudera / cdh | 5.4.3 | 5.4.3.x |
cloudera / cdh | 5.3.2 | 5.3.2.x |
cloudera / cdh | 5.2.4 | 5.2.4.x |
cloudera / cdh | 5.4.6 | 5.4.6.x |
cloudera / cdh | 5.5.1 | 5.5.1.x |
cloudera / cdh | 5.8.0 | 5.8.0.x |
cloudera / cdh | 5.4.11 | 5.4.11.x |
cloudera / cdh | 5.7.0 | 5.7.0.x |
cloudera / cdh | 5.4.0 | 5.4.0.x |
cloudera / cdh | 5.5.4 | 5.5.4.x |
cloudera / cdh | 5.5.5 | 5.5.5.x |
cloudera / cdh | 5.3.4 | 5.3.4.x |
cloudera / cdh | 5.4.8 | 5.4.8.x |
cloudera / cdh | 5.4.9 | 5.4.9.x |
cloudera / cdh | 5.2.1 | 5.2.1.x |
cloudera / cdh | 5.7.1 | 5.7.1.x |
cloudera / cdh | 5.5.6 | 5.5.6.x |
cloudera / cdh | 5.4.4 | 5.4.4.x |
cloudera / cdh | 5.4.1 | 5.4.1.x |
cloudera / cdh | 5.5.2 | 5.5.2.x |
cloudera / cdh | 5.7.2 | 5.7.2.x |
cloudera / cdh | 5.4.5 | 5.4.5.x |
cloudera / cdh | 5.2.2 | 5.2.2.x |
cloudera / cdh | 5.2.0 | 5.2.0.x |
cloudera / cdh | 5.2.3 | 5.2.3.x |
cloudera / cdh | 5.4.10 | 5.4.10.x |
cloudera / cdh | 5.3.8 | 5.3.8.x |
cloudera / cdh | 5.6.1 | 5.6.1.x |
cloudera / cdh | 5.2.5 | 5.2.5.x |
cloudera / cdh | 5.4.2 | 5.4.2.x |
cloudera / cdh | 5.5.0 | 5.5.0.x |
cloudera / cdh | 5.3.9 | 5.3.9.x |