ID CVE-2020-27781
Summary User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
References
Vulnerable Configurations
  • cpe:2.3:a:redhat:ceph:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.12:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.14:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.15:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.16:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.17:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.18:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.19:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.20:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.20.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.20.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.21:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.22:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.22.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.22.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.22.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.22.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.23:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.23.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.23.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.24:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.24.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.24.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.24.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.24.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.24.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.24.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.25:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.25.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.25.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.25.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.25.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.26:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.26:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.27:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.27:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.27.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.27.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.28:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.28.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.28.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.28.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.29:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.29:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.29.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.29.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.30:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.30:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.31:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.31:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.32:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.32:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.33:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.33:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.34:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.34:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.35:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.35:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.36:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.36:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.37:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.37:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.38:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.38:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.39:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.39:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.40:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.40:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.41:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.41:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.42:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.42:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.42.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.42.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.42.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.42.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.43:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.43:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.44:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.44:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.44.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.44.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.44.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.44.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.45:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.45:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.46:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.46:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.47:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.47:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.47.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.47.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.47.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.47.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.47.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.47.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.48:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.48:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.48.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.48.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.48.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.48.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.48.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.48.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.49:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.49:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.50:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.50:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.51:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.51:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.52:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.52:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.53:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.53:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.54:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.54:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.55:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.55:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.55.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.55.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.56.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.56.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.57:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.57:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.58:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.58:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.59:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.59:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.60:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.60:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.61.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.61.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.62:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.62:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.63:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.64:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.64:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.65:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.65:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.66:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.66:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67:rc2:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67:rc2:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67:rc3:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67:rc3:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.67.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.67.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.68:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.68:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.69:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.69:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.70:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.70:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.71:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.71:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.72:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.72:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.72:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.72:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.72.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.72.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.72.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.72.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.73:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.73:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.74:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.74:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.75:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.75:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.76:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.76:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.77:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.77:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.78:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.78:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.79:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.79:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80:rc1:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80:rc1:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.80.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.80.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.81:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.81:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.82:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.82:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.83:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.83:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.84:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.84:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.85:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.85:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.86:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.86:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.87:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.87:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.87.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.87.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.87.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.87.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.88:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.88:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.89:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.89:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.90:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.90:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.91:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.91:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.92:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.92:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.93:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.93:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:0.94.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:0.94.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:9.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:9.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.01:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.01:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:10.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:10.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:11.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:12.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:12.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:13.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:13.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:14.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:14.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:14.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:14.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:14.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:14.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:14.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:14.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:15.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:15.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:16.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:16.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph:16.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph:16.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVSS
Base: 3.6 (as of 23-10-2023 - 19:15)
Impact:
Exploitability:
CWE CWE-522
CAPEC
  • Use of Captured Tickets (Pass The Ticket)
    An adversary uses stolen Kerberos tickets to access systems that leverage the Kerberos authentication protocol. The Kerberos authentication protocol centers around a ticketing system which is used to request/grant access to services and to then access the requested services. An adversary can obtain any one of these tickets (e.g. Service Ticket, Ticket Granting Ticket, Silver Ticket, or Golden Ticket) to authenticate to a system without needing the account's credentials. Depending on the ticket obtained, the adversary may be able to access a particular resource or generate TGTs for any account within an Active Directory Domain.
  • Remote Services with Stolen Credentials
    This pattern of attack involves an adversary that uses stolen credentials to leverage remote services such as RDP, telnet, SSH, and VNC to log into a system. Once access is gained, any number of malicious activities could be performed.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
  • Use of Captured Hashes (Pass The Hash)
    An adversary uses stolen hash values for a user's credentials (username and password) to access systems managed under the same credential framwork that leverage the Lan Man (LM) and/or NT Lan Man (NTLM) authentication protocols. When authenticating via LM or NTLM, the hashed credentials' associated plaintext credentials are not requried for successful authentication. Therefore, if an adversary can obtain the hashed credentials of a user, he can then pass these hash values to the server or service to authenticate without needing to brute-force the hashes to obtain their cleartext values. The adversary can then impersonate the user and laterally move within the network. This technique can be performed against any operating system which leverages the LM or NTLM protocols.
  • Session Sidejacking
    Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system. The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic. Once a session token is captured, the attacker performs malicious actions by using the stolen token with the targeted application to impersonate the victim. This attack is a specific method of session hijacking, which is exploiting a valid session token to gain unauthorized access to a target system or information. Other methods to perform a session hijacking are session fixation, cross-site scripting, or compromising a user or server machine and stealing the session token.
  • Modify Existing Service
    When an operating system starts, it also starts programs called services or daemons. Modifying existing services may break existing services or may enable services that are disabled/not commonly used.
  • Windows Admin Shares with Stolen Credentials
    Windows systems have hidden network shares that are only accessible to administrators and allow files to be written to the local computer. Example network shares include: C$, ADMIN$ and IPC$. Adversaries may use valid administrator credentials to remotely access a network share to transfer files and execute code. It is possible for adversaries to use NTLM hashes to access administrator shares on systems with certain configuration and patch levels.
  • Password Recovery Exploitation
    An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure. Most of them use only one security question . For instance, mother's maiden name tends to be a fairly popular one. Unfortunately in many cases this information is not very hard to find, especially if the attacker knows the legitimate user. These generic security questions are also re-used across many applications, thus making them even more insecure. An attacker could for instance overhear a coworker talking to a bank representative at the work place and supplying their mother's maiden name for verification purposes. An attacker can then try to log in into one of the victim's accounts, click on "forgot password" and there is a good chance that the security question there will be to provide mother's maiden name. A weak password recovery scheme totally undermines the effectiveness of a strong password scheme.
  • Use of Known Domain Credentials
    An adversary uses stolen credentials (e.g., userid and password) to access systems managed under the same credential framework on a local network. Often, users are allowed to login to connected machines using the same password. Discovery of the password on one machine allows for lateral movement to those machines.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:N
redhat via4
rpms
  • ansible-runner-service-0:0.9-5.el8cp
  • ceph-ansible-0:4.0.41-1.el7cp
  • ceph-ansible-0:4.0.41-1.el8cp
  • ceph-base-2:14.2.11-95.el7cp
  • ceph-base-2:14.2.11-95.el8cp
  • ceph-base-debuginfo-2:14.2.11-95.el8cp
  • ceph-common-2:14.2.11-95.el7cp
  • ceph-common-2:14.2.11-95.el8cp
  • ceph-common-debuginfo-2:14.2.11-95.el8cp
  • ceph-debuginfo-2:14.2.11-95.el7cp
  • ceph-debugsource-2:14.2.11-95.el8cp
  • ceph-fuse-2:14.2.11-95.el7cp
  • ceph-fuse-2:14.2.11-95.el8cp
  • ceph-fuse-debuginfo-2:14.2.11-95.el8cp
  • ceph-grafana-dashboards-2:14.2.11-95.el7cp
  • ceph-grafana-dashboards-2:14.2.11-95.el8cp
  • ceph-mds-2:14.2.11-95.el7cp
  • ceph-mds-2:14.2.11-95.el8cp
  • ceph-mds-debuginfo-2:14.2.11-95.el8cp
  • ceph-mgr-2:14.2.11-95.el7cp
  • ceph-mgr-2:14.2.11-95.el8cp
  • ceph-mgr-dashboard-2:14.2.11-95.el7cp
  • ceph-mgr-dashboard-2:14.2.11-95.el8cp
  • ceph-mgr-debuginfo-2:14.2.11-95.el8cp
  • ceph-mgr-diskprediction-local-2:14.2.11-95.el7cp
  • ceph-mgr-diskprediction-local-2:14.2.11-95.el8cp
  • ceph-mgr-k8sevents-2:14.2.11-95.el7cp
  • ceph-mgr-k8sevents-2:14.2.11-95.el8cp
  • ceph-mgr-rook-2:14.2.11-95.el7cp
  • ceph-mgr-rook-2:14.2.11-95.el8cp
  • ceph-mon-2:14.2.11-95.el7cp
  • ceph-mon-2:14.2.11-95.el8cp
  • ceph-mon-debuginfo-2:14.2.11-95.el8cp
  • ceph-osd-2:14.2.11-95.el7cp
  • ceph-osd-2:14.2.11-95.el8cp
  • ceph-osd-debuginfo-2:14.2.11-95.el8cp
  • ceph-radosgw-2:14.2.11-95.el7cp
  • ceph-radosgw-2:14.2.11-95.el8cp
  • ceph-radosgw-debuginfo-2:14.2.11-95.el8cp
  • ceph-selinux-2:14.2.11-95.el7cp
  • ceph-selinux-2:14.2.11-95.el8cp
  • ceph-test-2:14.2.11-95.el7cp
  • ceph-test-2:14.2.11-95.el8cp
  • ceph-test-debuginfo-2:14.2.11-95.el8cp
  • cockpit-ceph-installer-0:1.4-0.el7cp
  • cockpit-ceph-installer-0:1.4-0.el8cp
  • libcephfs-devel-2:14.2.11-95.el7cp
  • libcephfs-devel-2:14.2.11-95.el8cp
  • libcephfs2-2:14.2.11-95.el7cp
  • libcephfs2-2:14.2.11-95.el8cp
  • libcephfs2-debuginfo-2:14.2.11-95.el8cp
  • libntirpc-0:3.3-0.1.el7cp
  • libntirpc-0:3.3-0.1.el8cp
  • libntirpc-debuginfo-0:3.3-0.1.el7cp
  • libntirpc-debuginfo-0:3.3-0.1.el8cp
  • libntirpc-debugsource-0:3.3-0.1.el8cp
  • librados-devel-2:14.2.11-95.el7cp
  • librados-devel-2:14.2.11-95.el8cp
  • librados-devel-debuginfo-2:14.2.11-95.el8cp
  • librados2-2:14.2.11-95.el7cp
  • librados2-2:14.2.11-95.el8cp
  • librados2-debuginfo-2:14.2.11-95.el8cp
  • libradospp-devel-2:14.2.11-95.el7cp
  • libradospp-devel-2:14.2.11-95.el8cp
  • libradosstriper1-2:14.2.11-95.el7cp
  • libradosstriper1-2:14.2.11-95.el8cp
  • libradosstriper1-debuginfo-2:14.2.11-95.el8cp
  • librbd-devel-2:14.2.11-95.el7cp
  • librbd-devel-2:14.2.11-95.el8cp
  • librbd1-2:14.2.11-95.el7cp
  • librbd1-2:14.2.11-95.el8cp
  • librbd1-debuginfo-2:14.2.11-95.el8cp
  • librgw-devel-2:14.2.11-95.el7cp
  • librgw-devel-2:14.2.11-95.el8cp
  • librgw2-2:14.2.11-95.el7cp
  • librgw2-2:14.2.11-95.el8cp
  • librgw2-debuginfo-2:14.2.11-95.el8cp
  • nfs-ganesha-0:3.3-0.4.el7cp
  • nfs-ganesha-0:3.3-0.4.el8cp
  • nfs-ganesha-ceph-0:3.3-0.4.el7cp
  • nfs-ganesha-ceph-0:3.3-0.4.el8cp
  • nfs-ganesha-ceph-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-debuginfo-0:3.3-0.4.el7cp
  • nfs-ganesha-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-debugsource-0:3.3-0.4.el8cp
  • nfs-ganesha-proxy-0:3.3-0.4.el7cp
  • nfs-ganesha-proxy-0:3.3-0.4.el8cp
  • nfs-ganesha-proxy-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-rados-grace-0:3.3-0.4.el7cp
  • nfs-ganesha-rados-grace-0:3.3-0.4.el8cp
  • nfs-ganesha-rados-grace-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-rados-urls-0:3.3-0.4.el7cp
  • nfs-ganesha-rados-urls-0:3.3-0.4.el8cp
  • nfs-ganesha-rados-urls-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-rgw-0:3.3-0.4.el7cp
  • nfs-ganesha-rgw-0:3.3-0.4.el8cp
  • nfs-ganesha-rgw-debuginfo-0:3.3-0.4.el8cp
  • nfs-ganesha-selinux-0:3.3-0.4.el7cp
  • nfs-ganesha-selinux-0:3.3-0.4.el8cp
  • nfs-ganesha-vfs-0:3.3-0.4.el7cp
  • nfs-ganesha-vfs-0:3.3-0.4.el8cp
  • nfs-ganesha-vfs-debuginfo-0:3.3-0.4.el8cp
  • python-ceph-argparse-2:14.2.11-95.el7cp
  • python-cephfs-2:14.2.11-95.el7cp
  • python-rados-2:14.2.11-95.el7cp
  • python-rbd-2:14.2.11-95.el7cp
  • python-rgw-2:14.2.11-95.el7cp
  • python2-repoze-lru-0:0.7-8.el7cp
  • python3-ceph-argparse-2:14.2.11-95.el8cp
  • python3-cephfs-2:14.2.11-95.el8cp
  • python3-cephfs-debuginfo-2:14.2.11-95.el8cp
  • python3-rados-2:14.2.11-95.el8cp
  • python3-rados-debuginfo-2:14.2.11-95.el8cp
  • python3-rbd-2:14.2.11-95.el8cp
  • python3-rbd-debuginfo-2:14.2.11-95.el8cp
  • python3-repoze-lru-0:0.7-6.el8ost
  • python3-rgw-2:14.2.11-95.el8cp
  • python3-rgw-debuginfo-2:14.2.11-95.el8cp
  • rbd-fuse-debuginfo-2:14.2.11-95.el8cp
  • rbd-mirror-2:14.2.11-95.el7cp
  • rbd-mirror-2:14.2.11-95.el8cp
  • rbd-mirror-debuginfo-2:14.2.11-95.el8cp
  • rbd-nbd-2:14.2.11-95.el7cp
  • rbd-nbd-2:14.2.11-95.el8cp
  • rbd-nbd-debuginfo-2:14.2.11-95.el8cp
refmap via4
fedora FEDORA-2020-fcafbe7225
misc https://bugzilla.redhat.com/show_bug.cgi?id=1900109
Last major update 23-10-2023 - 19:15
Published 18-12-2020 - 21:15
Last modified 23-10-2023 - 19:15
Back to Top