Total vulnerabilities in the database
It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
Software | From | Fixed in |
---|---|---|
redhat / ceph | - | 13.2.4 |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
opensuse / leap | 15.0 | 15.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / ceph_storage | 3.0 | 3.0.x |
redhat / ceph_storage | 2.0 | 2.0.x |
canonical / ubuntu_linux | 18.10 | 18.10.x |
canonical / ubuntu_linux | 19.04 | 19.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |