Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/ceph@2:20.1.0-144?arch=el10cp
purl pkg:rpm/redhat/ceph@2:20.1.0-144?arch=el10cp
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-18bk-met9-qfc9
Aliases:
CVE-2024-31884
pybind: Improper use of Pybind There are no reported fixed by versions.
VCID-h8nr-tcb7-93em
Aliases:
CVE-2024-11831
GHSA-76p7-773f-r4q5
Cross-site Scripting (XSS) in serialize-javascript A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package. There are no reported fixed by versions.
VCID-r1ah-c6z7-vyen
Aliases:
CVE-2025-52555
ceph: privilege escalation by unprivileged users in a ceph-fuse mounted CephFS There are no reported fixed by versions.
VCID-s5gr-zsbz-xkbe
Aliases:
CVE-2025-30204
GHSA-mh63-6h87-95cp
jwt-go allows excessive memory allocation during header parsing ### Summary Function [`parse.ParseUnverified`](https://github.com/golang-jwt/jwt/blob/c035977d9e11c351f4c05dfeae193923cbab49ee/parser.go#L138-L139) currently splits (via a call to [strings.Split](https://pkg.go.dev/strings#Split)) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose _Authorization_ header consists of `Bearer ` followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: [CWE-405: Asymmetric Resource Consumption (Amplification)](https://cwe.mitre.org/data/definitions/405.html) ### Details See [`parse.ParseUnverified`](https://github.com/golang-jwt/jwt/blob/c035977d9e11c351f4c05dfeae193923cbab49ee/parser.go#L138-L139) ### Impact Excessive memory allocation There are no reported fixed by versions.
VCID-yyye-gaug-8uh2
Aliases:
CVE-2023-25153
GHSA-259w-8hf6-59c2
OCI image importer memory exhaustion in github.com/containerd/containerd ### Impact When importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. ### Patches This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. ### Workarounds Ensure that only trusted images are used and that only trusted users have permissions to import images. ### Credits The containerd project would like to thank [David Korczynski](https://github.com/DavidKorczynski) and [Adam Korczynski](https://github.com/AdamKorcz) of ADA Logics for responsibly disclosing this issue in accordance with the [containerd security policy](https://github.com/containerd/project/blob/main/SECURITY.md) during a security fuzzing audit sponsored by CNCF. ### For more information If you have any questions or comments about this advisory: * Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose) * Email us at [security@containerd.io](mailto:security@containerd.io) To report a security issue in containerd: * [Report a new vulnerability](https://github.com/containerd/containerd/security/advisories/new) * Email us at [security@containerd.io](mailto:security@containerd.io) There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-19T06:26:21.995319+00:00 RedHat Importer Affected by VCID-h8nr-tcb7-93em https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11831.json 38.4.0
2026-04-01T13:55:18.807409+00:00 RedHat Importer Affected by VCID-yyye-gaug-8uh2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25153.json 38.0.0
2026-04-01T13:45:12.555668+00:00 RedHat Importer Affected by VCID-h8nr-tcb7-93em https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11831.json 38.0.0
2026-04-01T13:41:44.404867+00:00 RedHat Importer Affected by VCID-s5gr-zsbz-xkbe https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30204.json 38.0.0
2026-04-01T13:38:57.518764+00:00 RedHat Importer Affected by VCID-r1ah-c6z7-vyen https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52555.json 38.0.0
2026-04-01T13:32:29.849121+00:00 RedHat Importer Affected by VCID-18bk-met9-qfc9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31884.json 38.0.0