Search for packages
| purl | pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie |
| Next non-vulnerable version | 18.2.4+ds-11 |
| Latest non-vulnerable version | 18.2.8+ds-1 |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-18bk-met9-qfc9
Aliases: CVE-2024-31884 |
pybind: Improper use of Pybind |
Affected by 0 other vulnerabilities. |
|
VCID-1yz5-m9s7-nqdm
Aliases: CVE-2024-47866 |
rgw: RGW DoS attack with empty HTTP header in S3 object copy |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-r1ah-c6z7-vyen
Aliases: CVE-2025-52555 |
ceph: privilege escalation by unprivileged users in a ceph-fuse mounted CephFS |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1fhp-86sm-bqe5 | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-25660
|
| VCID-36gd-352p-n7b7 | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2021-20288
|
| VCID-3pwt-4j1y-dbg6 | ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend |
CVE-2019-10222
|
| VCID-47cr-h639-tqd4 | rgw: improperly verified POST keys |
CVE-2023-43040
|
| VCID-4mk7-e67u-zkgy | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-27781
|
| VCID-54nw-yq6d-2ueu | A vulnerability has been found in Ceph which can lead to root privilege escalation. |
CVE-2022-3650
|
| VCID-5bgn-2pbq-6yd1 | ceph: user/tenant can obtain access (read/write) to any share |
CVE-2022-0670
|
| VCID-6kbn-psnc-q3cy | ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW |
CVE-2020-12059
|
| VCID-7k2s-fmzx-a3d8 | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-25678
|
| VCID-9e77-3unf-r3hu | ceph-dashboard: Cross-site scripting via token Cookie |
CVE-2021-3509
|
| VCID-a4u3-63ez-gfbc | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-10753
|
| VCID-axaa-8h31-j3gd | security update |
CVE-2018-1129
|
| VCID-bdcb-c7nj-j7gw | security update |
CVE-2018-10861
|
| VCID-bysx-t7fz-5kdk | Ceph: RGW returns requested bucket name raw in Bucket response header |
CVE-2015-5245
|
| VCID-cm58-jgsb-7yaf | ceph: RGW permits bucket listing when authenticated_users=read |
CVE-2016-7031
|
| VCID-cqkj-bda2-2fb2 | ceph: Failed assertion through user input in ceph_assert() function in rgw_iam_policy.cc |
CVE-2017-16818
|
| VCID-d8ft-cst1-5yh5 | security update |
CVE-2017-7519
|
| VCID-dqnx-pbyr-43at | ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service |
CVE-2018-7262
|
| VCID-fy1p-qh8k-m7b8 | ceph: ListBucket max-keys has no defined limit in the RGW codebase |
CVE-2018-16846
|
| VCID-gj55-s7r1-f3b4 | Ceph: RGW Denial of Service by sending null or specially crafted POST object requests |
CVE-2016-8626
|
| VCID-gjne-rqt9-jqc5 | ceph: improper URL checking leads to information disclosure |
CVE-2020-1699
|
| VCID-grz8-4a4n-1fap | ceph: radosgw: Resource exhaustion via TCP connection to port serving the SSL endpoint |
CVE-2019-3821
|
| VCID-kxvn-yjm8-3ygt | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-1760
|
| VCID-m5wq-1w2k-9khk | ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers |
CVE-2020-27839
|
| VCID-mqt6-kw7g-xff7 | ceph: possible DoS issue in ceph URL processing on RGW backends |
CVE-2022-3854
|
| VCID-nczx-qfyh-xubz | ceph: Ceph volume does not honour osd_dmcrypt_key_size |
CVE-2021-3979
|
| VCID-p6nr-dpnz-u3gs | ceph: denial of service in RGW daemon |
CVE-2019-19337
|
| VCID-pp2v-1dp5-4bbd | ceph: connection leak in the RGW Beast front-end permits a DoS against the RGW server |
CVE-2020-1700
|
| VCID-qkp7-s947-ufcu | Multiple vulnerabilities have been found in Ceph, the worst of which could result in privilege escalation. |
CVE-2020-1759
|
| VCID-qr8p-ec3h-37at | crash: mon_command crashes ceph monitors on receiving empty prefix |
CVE-2016-5009
|
| VCID-rukb-cwpx-q3hy | gateway: radosgw: CRLF injection |
CVE-2021-3524
|
| VCID-ss2f-8hxs-myb1 | ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request |
CVE-2016-9579
|
| VCID-ssk3-kfn8-vuhy | ceph: debug logging for v4 auth does not sanitize encryption keys |
CVE-2018-16889
|
| VCID-vkxb-yabn-wyhu | ceph: authorization bypass in monitor and manager daemons |
CVE-2020-10736
|
| VCID-www5-5x6q-xyeu | ceph: rhceph-container: Authentication bypass in CEPH RadosGW |
CVE-2024-48916
|
| VCID-xsvh-emr7-r7as | security update |
CVE-2018-1128
|
| VCID-yr1z-udw9-mfha | ceph: authenticated user with read only permissions can steal dm-crypt / LUKS key |
CVE-2018-14662
|
| VCID-zbwp-sfx4-xke7 | ceph: RGW unauthenticated denial of service |
CVE-2021-3531
|