Search for packages
| purl | pkg:deb/debian/ceph@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-cqkj-bda2-2fb2 | ceph: Failed assertion through user input in ceph_assert() function in rgw_iam_policy.cc |
CVE-2017-16818
|
| VCID-dqnx-pbyr-43at | ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service |
CVE-2018-7262
|
| VCID-grz8-4a4n-1fap | ceph: radosgw: Resource exhaustion via TCP connection to port serving the SSL endpoint |
CVE-2019-3821
|
| VCID-mqt6-kw7g-xff7 | ceph: possible DoS issue in ceph URL processing on RGW backends |
CVE-2022-3854
|
| VCID-p6nr-dpnz-u3gs | ceph: denial of service in RGW daemon |
CVE-2019-19337
|
| VCID-vkxb-yabn-wyhu | ceph: authorization bypass in monitor and manager daemons |
CVE-2020-10736
|
| VCID-www5-5x6q-xyeu | ceph: rhceph-container: Authentication bypass in CEPH RadosGW |
CVE-2024-48916
|