VYPR

rpm package

opensuse/ceph&distro=openSUSE Leap 15.1

pkg:rpm/opensuse/ceph&distro=openSUSE%20Leap%2015.1

Vulnerabilities (7)

  • CVE-2020-27781Dec 18, 2020
    affected < 14.2.16.402+g7d47dbaf4d-lp151.2.31.1fixed 14.2.16.402+g7d47dbaf4d-lp151.2.31.1

    User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved vi

  • CVE-2020-25660Nov 23, 2020
    affected < 14.2.13.450+g65ea1b614d-lp151.2.28.1fixed 14.2.13.450+g65ea1b614d-lp151.2.28.1

    A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authen

  • CVE-2020-10753Jun 26, 2020
    affected < 14.2.9.970+ged84cae0c9-lp151.2.19.1fixed 14.2.9.970+ged84cae0c9-lp151.2.19.1

    A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the

  • CVE-2020-1760Apr 23, 2020
    affected < 14.2.5.389+gb0f23ac248-lp151.2.13.1fixed 14.2.5.389+gb0f23ac248-lp151.2.13.1

    A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.

  • CVE-2020-1699Apr 21, 2020
    affected < 14.2.5.382+g8881d33957-lp151.2.10.1fixed 14.2.5.382+g8881d33957-lp151.2.10.1

    A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine r

  • CVE-2020-1759Apr 13, 2020
    affected < 14.2.5.389+gb0f23ac248-lp151.2.13.1fixed 14.2.5.389+gb0f23ac248-lp151.2.13.1

    A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by

  • CVE-2020-1700Feb 7, 2020
    affected < 14.2.5.382+g8881d33957-lp151.2.10.1fixed 14.2.5.382+g8881d33957-lp151.2.10.1

    A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of servi