Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-1700 (GCVE-0-2020-1700)
Vulnerability from cvelistv5 – Published: 2020-02-07 00:00 – Updated: 2024-08-04 06:46
VLAI?
EPSS
Summary
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Severity ?
6.5 (Medium)
CWE
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:46:30.305Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"name": "openSUSE-SU-2020:0187",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"name": "USN-4304-1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4304-1/"
},
{
"name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ceph",
"vendor": "[UNKNOWN]",
"versions": [
{
"status": "affected",
"version": "14.2.4-125.el8cp"
},
{
"status": "affected",
"version": "14.2.4-51.el7cp"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-23T18:06:21.214Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"name": "openSUSE-SU-2020:0187",
"tags": [
"vendor-advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"name": "USN-4304-1",
"tags": [
"vendor-advisory"
],
"url": "https://usn.ubuntu.com/4304-1/"
},
{
"name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2020-1700",
"datePublished": "2020-02-07T00:00:00.000Z",
"dateReserved": "2019-11-27T00:00:00.000Z",
"dateUpdated": "2024-08-04T06:46:30.305Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F488D9-BD97-4155-B172-096DBC508395\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27383B6A-33D8-4D00-A3F8-37BA97A395EA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 un fallo en la manera en que el front-end Ceph RGW Beast maneja desconexiones inesperadas. Un atacante autenticado puede abusar de este fallo al realizar m\\u00faltiples intentos de desconexi\\u00f3n resultando en una fuga permanente de una conexi\\u00f3n de socket mediante radosgw. Este fallo podr\\u00eda conllevar a una condici\\u00f3n de denegaci\\u00f3n de servicio mediante la acumulaci\\u00f3n de sockets CLOSE_WAIT, conduciendo eventualmente al agotamiento de los recursos disponibles, impidiendo a usuarios leg\\u00edtimos conectarse al sistema.\"}]",
"id": "CVE-2020-1700",
"lastModified": "2024-11-21T05:11:11.900",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:C\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-02-07T21:15:10.433",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://usn.ubuntu.com/4304-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/4304-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-1700\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-02-07T21:15:10.433\",\"lastModified\":\"2024-11-21T05:11:11.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en la manera en que el front-end Ceph RGW Beast maneja desconexiones inesperadas. Un atacante autenticado puede abusar de este fallo al realizar m\u00faltiples intentos de desconexi\u00f3n resultando en una fuga permanente de una conexi\u00f3n de socket mediante radosgw. Este fallo podr\u00eda conllevar a una condici\u00f3n de denegaci\u00f3n de servicio mediante la acumulaci\u00f3n de sockets CLOSE_WAIT, conduciendo eventualmente al agotamiento de los recursos disponibles, impidiendo a usuarios leg\u00edtimos conectarse al sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:C\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F488D9-BD97-4155-B172-096DBC508395\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27383B6A-33D8-4D00-A3F8-37BA97A395EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/4304-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4304-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
BDU:2021-01325
Vulnerability from fstec - Published: 07.02.2020
VLAI Severity ?
Title
Уязвимость метода rgw::asio::ClientIO из rgw/rgw_asio_frontend.cc системы хранения данных Ceph, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость метода rgw::asio::ClientIO из rgw/rgw_asio_frontend.cc системы хранения данных Ceph связана с ошибкой механизма контроля расходуемых ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения, Canonical Ltd., ООО «РусБИТех-Астра», Novell Inc., АО «ИВК», АО "НППКТ"
Software Name
Debian GNU/Linux, Ubuntu, Astra Linux Special Edition (запись в едином реестре российских программ №369), Astra Linux Common Edition (запись в едином реестре российских программ №4433), OpenSUSE Leap, Ceph, Альт 8 СП (запись в едином реестре российских программ №4305), ОСОН ОСнова Оnyx (запись в едином реестре российских программ №5913)
Software Version
9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 «Смоленск» (Astra Linux Special Edition), 2.12 «Орёл» (Astra Linux Common Edition), 15.1 (OpenSUSE Leap), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 19.10 (Ubuntu), 12.2.11 (Ceph), - (Альт 8 СП), до 2.3 (ОСОН ОСнова Оnyx)
Possible Mitigations
Использование рекомендаций:
Для Ceph:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700
Для Debian:
https://security-tracker.debian.org/tracker/CVE-2020-1700
Для программных продуктов Novell Inc.:
https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html
Для Ubuntu:
https://ubuntu.com/security/notices/USN-4304-1
Для Astra Linux:
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16
Для ОСОН Основа:
Обновление программного обеспечения ceph до версии 12.2.11+dfsg1.repack-2.1.osnova0u1
Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства
Reference
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700
https://nvd.nist.gov/vuln/detail/CVE-2020-1700
https://security-tracker.debian.org/tracker/CVE-2020-1700
https://usn.ubuntu.com/4304-1/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16
https://поддержка.нппкт.рф/bin/view/ОСнова/Обновления/2.3/
https://altsp.su/obnovleniya-bezopasnosti/
CWE
CWE-400
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Novell Inc., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (Astra Linux Common Edition), 15.1 (OpenSUSE Leap), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 19.10 (Ubuntu), 12.2.11 (Ceph), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 2.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Ceph:\n https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\n\n\u0414\u043b\u044f Debian:\nhttps://security-tracker.debian.org/tracker/CVE-2020-1700\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-4304-1\n\n\u0414\u043b\u044f Astra Linux:\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f ceph \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 12.2.11+dfsg1.repack-2.1.osnova0u1\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.02.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.03.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-01325",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-1700",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Ubuntu, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), OpenSUSE Leap, Ceph, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), Novell Inc. OpenSUSE Leap 15.1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Canonical Ltd. Ubuntu 19.10 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0430 rgw::asio::ClientIO \u0438\u0437 rgw/rgw_asio_frontend.cc \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 Ceph, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0442\u043e\u0434\u0430 rgw::asio::ClientIO \u0438\u0437 rgw/rgw_asio_frontend.cc \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 Ceph \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0440\u0430\u0441\u0445\u043e\u0434\u0443\u0435\u043c\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-1700\nhttps://security-tracker.debian.org/tracker/CVE-2020-1700\nhttps://usn.ubuntu.com/4304-1/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.3/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,3)"
}
SUSE-SU-2020:0296-1
Vulnerability from csaf_suse - Published: 2020-01-31 16:23 - Updated: 2020-01-31 16:23Summary
Security update for ceph
Severity
Moderate
Notes
Title of the patch: Security update for ceph
Description of the patch: This update for ceph fixes the following issues:
- CVE-2020-1700: Fixed a denial of service against the RGW server via connection leakage (bsc#1161312).
- CVE-2020-1699: Fixed a information disclosure by improper URL checking (bsc#1161074).
Patchnames: SUSE-2020-296,SUSE-SLE-Module-Basesystem-15-SP1-2020-296,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-296,SUSE-Storage-6-2020-296
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ceph",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ceph fixes the following issues:\n\n- CVE-2020-1700: Fixed a denial of service against the RGW server via connection leakage (bsc#1161312).\n- CVE-2020-1699: Fixed a information disclosure by improper URL checking (bsc#1161074).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-296,SUSE-SLE-Module-Basesystem-15-SP1-2020-296,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-296,SUSE-Storage-6-2020-296",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0296-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0296-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200296-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0296-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006423.html"
},
{
"category": "self",
"summary": "SUSE Bug 1161074",
"url": "https://bugzilla.suse.com/1161074"
},
{
"category": "self",
"summary": "SUSE Bug 1161312",
"url": "https://bugzilla.suse.com/1161312"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1699 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1700 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1700/"
}
],
"title": "Security update for ceph",
"tracking": {
"current_release_date": "2020-01-31T16:23:50Z",
"generator": {
"date": "2020-01-31T16:23:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0296-1",
"initial_release_date": "2020-01-31T16:23:50Z",
"revision_history": [
{
"date": "2020-01-31T16:23:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"product_id": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-ssh-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-mgr-ssh-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-mgr-ssh-14.2.5.382+g8881d33957-3.30.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"product": {
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"product_id": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-base-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"product_id": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-base-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librados2-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librbd1-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "librgw2-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.s390x"
}
},
{
"category": "product_version",
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"product_id": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-test-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "ceph-test-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "ceph-test-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"product_id": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le"
},
"product_reference": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x"
},
"product_reference": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch"
},
"product_reference": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch"
},
"product_reference": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch"
},
"product_reference": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch"
},
"product_reference": "ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch"
},
"product_reference": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64"
},
"product_reference": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64"
},
"product_reference": "rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-1699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1699"
}
],
"notes": [
{
"category": "general",
"text": "A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1699",
"url": "https://www.suse.com/security/cve/CVE-2020-1699"
},
{
"category": "external",
"summary": "SUSE Bug 1161074 for CVE-2020-1699",
"url": "https://bugzilla.suse.com/1161074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-31T16:23:50Z",
"details": "moderate"
}
],
"title": "CVE-2020-1699"
},
{
"cve": "CVE-2020-1700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1700"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1700",
"url": "https://www.suse.com/security/cve/CVE-2020-1700"
},
{
"category": "external",
"summary": "SUSE Bug 1161312 for CVE-2020-1700",
"url": "https://bugzilla.suse.com/1161312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-base-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-grafana-dashboards-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mds-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mgr-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-mgr-dashboard-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mgr-rook-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-mon-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-osd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:ceph-prometheus-alerts-14.2.5.382+g8881d33957-3.30.1.noarch",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:ceph-radosgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:cephfs-shell-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-fuse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-mirror-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Enterprise Storage 6:rbd-nbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:ceph-common-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libcephfs2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librados2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libradospp-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librbd1-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw-devel-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:librgw2-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-ceph-argparse-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-cephfs-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rados-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rbd-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:python3-rgw-14.2.5.382+g8881d33957-3.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:rados-objclass-devel-14.2.5.382+g8881d33957-3.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-31T16:23:50Z",
"details": "moderate"
}
],
"title": "CVE-2020-1700"
}
]
}
GSD-2020-1700
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-1700",
"description": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.",
"id": "GSD-2020-1700",
"references": [
"https://www.suse.com/security/cve/CVE-2020-1700.html",
"https://ubuntu.com/security/CVE-2020-1700"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-1700"
],
"details": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.",
"id": "GSD-2020-1700",
"modified": "2023-12-13T01:21:59.003642Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-1700",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ceph",
"version": {
"version_data": [
{
"version_value": "14.2.4-125.el8cp"
},
{
"version_value": "14.2.4-51.el7cp"
}
]
}
}
]
},
"vendor_name": "[UNKNOWN]"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"name": "openSUSE-SU-2020:0187",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"name": "USN-4304-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4304-1/"
},
{
"name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-1700"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"name": "openSUSE-SU-2020:0187",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"name": "USN-4304-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4304-1/"
},
{
"name": "[debian-lts-announce] 20231023 [SECURITY] [DLA 3629-1] ceph security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-10-23T19:15Z",
"publishedDate": "2020-02-07T21:15Z"
}
}
}
FKIE_CVE-2020-1700
Vulnerability from fkie_nvd - Published: 2020-02-07 21:15 - Updated: 2024-11-21 05:11
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html | ||
| secalert@redhat.com | https://usn.ubuntu.com/4304-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4304-1/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ceph | ceph | - | |
| redhat | openshift_container_storage | 4.2 | |
| opensuse | leap | 15.1 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 19.10 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46F488D9-BD97-4155-B172-096DBC508395",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_storage:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "27383B6A-33D8-4D00-A3F8-37BA97A395EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un fallo en la manera en que el front-end Ceph RGW Beast maneja desconexiones inesperadas. Un atacante autenticado puede abusar de este fallo al realizar m\u00faltiples intentos de desconexi\u00f3n resultando en una fuga permanente de una conexi\u00f3n de socket mediante radosgw. Este fallo podr\u00eda conllevar a una condici\u00f3n de denegaci\u00f3n de servicio mediante la acumulaci\u00f3n de sockets CLOSE_WAIT, conduciendo eventualmente al agotamiento de los recursos disponibles, impidiendo a usuarios leg\u00edtimos conectarse al sistema."
}
],
"id": "CVE-2020-1700",
"lastModified": "2024-11-21T05:11:11.900",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-02-07T21:15:10.433",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4304-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4304-1/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2020:0187-1
Vulnerability from csaf_opensuse - Published: 2020-02-08 15:12 - Updated: 2020-02-08 15:12Summary
Security update for ceph
Severity
Moderate
Notes
Title of the patch: Security update for ceph
Description of the patch: This update for ceph fixes the following issues:
- CVE-2020-1700: Fixed a denial of service against the RGW server via connection leakage (bsc#1161312).
- CVE-2020-1699: Fixed a information disclosure by improper URL checking (bsc#1161074).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames: openSUSE-2020-187
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ceph",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ceph fixes the following issues:\n\n- CVE-2020-1700: Fixed a denial of service against the RGW server via connection leakage (bsc#1161312).\n- CVE-2020-1699: Fixed a information disclosure by improper URL checking (bsc#1161074).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-187",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0187-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0187-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFNDLPWVL33C6GRY4RNPOQ77ME6FHZA4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0187-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFNDLPWVL33C6GRY4RNPOQ77ME6FHZA4/"
},
{
"category": "self",
"summary": "SUSE Bug 1161074",
"url": "https://bugzilla.suse.com/1161074"
},
{
"category": "self",
"summary": "SUSE Bug 1161312",
"url": "https://bugzilla.suse.com/1161312"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1699 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1700 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1700/"
}
],
"title": "Security update for ceph",
"tracking": {
"current_release_date": "2020-02-08T15:12:58Z",
"generator": {
"date": "2020-02-08T15:12:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0187-1",
"initial_release_date": "2020-02-08T15:12:58Z",
"revision_history": [
{
"date": "2020-02-08T15:12:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product": {
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"product_id": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"product_id": "rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch"
},
"product_reference": "ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
},
"product_reference": "rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-1699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1699"
}
],
"notes": [
{
"category": "general",
"text": "A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1699",
"url": "https://www.suse.com/security/cve/CVE-2020-1699"
},
{
"category": "external",
"summary": "SUSE Bug 1161074 for CVE-2020-1699",
"url": "https://bugzilla.suse.com/1161074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T15:12:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-1699"
},
{
"cve": "CVE-2020-1700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1700"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1700",
"url": "https://www.suse.com/security/cve/CVE-2020-1700"
},
{
"category": "external",
"summary": "SUSE Bug 1161312 for CVE-2020-1700",
"url": "https://bugzilla.suse.com/1161312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:ceph-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-base-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-common-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-grafana-dashboards-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mds-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-mgr-dashboard-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-cloud-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-diskprediction-local-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-k8sevents-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-rook-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mgr-ssh-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-mon-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-osd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-prometheus-alerts-14.2.5.382+g8881d33957-lp151.2.10.1.noarch",
"openSUSE Leap 15.1:ceph-radosgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-resource-agents-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:ceph-test-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:cephfs-shell-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libcephfs2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librados2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradospp-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:libradosstriper1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librbd1-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:librgw2-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-ceph-argparse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-cephfs-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rados-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:python3-rgw-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rados-objclass-devel-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-fuse-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-mirror-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64",
"openSUSE Leap 15.1:rbd-nbd-14.2.5.382+g8881d33957-lp151.2.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T15:12:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-1700"
}
]
}
GHSA-G4R6-J635-4PR7
Vulnerability from github – Published: 2022-05-24 17:08 – Updated: 2023-10-23 21:30
VLAI?
Details
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Severity ?
6.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2020-1700"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-02-07T21:15:00Z",
"severity": "MODERATE"
},
"details": "A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.",
"id": "GHSA-g4r6-j635-4pr7",
"modified": "2023-10-23T21:30:57Z",
"published": "2022-05-24T17:08:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1700"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4304-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…