Versions Packages Information History CVEs Related Badges Report

Packages for ceph

348 package(s) known

AlmaLinux 8
AppStream

ceph

12.2.7 Potentially vulnerable (1:12.2.7-9.el8)
  • Summary:
    User space components of the Ceph file system
  • Maintainer:
  • Category:
    • Unspecified
  • License:
    • LGPL-2.1 and CC-BY-SA-1.0 and GPL-2.0 and BSL-1.0 and BSD-3-Clause and MIT
  • Links(s):

ceph

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-base

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-bash-completion

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-common

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-dev

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-doc

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-fuse

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-mds

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-mgr

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-mon

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-osd

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph-radosgw

14.2.9 Potentially vulnerable (14.2.9-r0)

libcephfs

14.2.9 Potentially vulnerable (14.2.9-r0)

librados

14.2.9 Potentially vulnerable (14.2.9-r0)

libradosstriper

14.2.9 Potentially vulnerable (14.2.9-r0)

librbd

14.2.9 Potentially vulnerable (14.2.9-r0)

py2-cephfs

14.2.9 Potentially vulnerable (14.2.9-r0)

py2-rados

14.2.9 Potentially vulnerable (14.2.9-r0)

py2-rbd

14.2.9 Potentially vulnerable (14.2.9-r0)

rbd-fuse

14.2.9 Potentially vulnerable (14.2.9-r0)

rbd-mirror

14.2.9 Potentially vulnerable (14.2.9-r0)

rbd-nbd

14.2.9 Potentially vulnerable (14.2.9-r0)

ceph

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-base

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-bash-completion

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-common

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-dev

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-doc

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-fuse

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mds

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mgr

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon-daemon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon-tools

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-openrc

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd-daemon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd-tools

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-radosgw

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-user

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-volume

14.2.19 Potentially vulnerable (14.2.19-r0)

libcephfs

14.2.19 Potentially vulnerable (14.2.19-r0)

librados

14.2.19 Potentially vulnerable (14.2.19-r0)

libradosstriper

14.2.19 Potentially vulnerable (14.2.19-r0)

librbd

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-cephfs

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-rados

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-rbd

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-fuse

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-mirror

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-nbd

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-base

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-bash-completion

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-common

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-dev

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-doc

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-fuse

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mds

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mgr

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon-daemon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-mon-tools

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-openrc

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd-daemon

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-osd-tools

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-radosgw

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-user

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph-volume

14.2.19 Potentially vulnerable (14.2.19-r0)

libcephfs

14.2.19 Potentially vulnerable (14.2.19-r0)

librados

14.2.19 Potentially vulnerable (14.2.19-r0)

libradosstriper

14.2.19 Potentially vulnerable (14.2.19-r0)

librbd

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-cephfs

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-rados

14.2.19 Potentially vulnerable (14.2.19-r0)

py3-rbd

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-fuse

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-mirror

14.2.19 Potentially vulnerable (14.2.19-r0)

rbd-nbd

14.2.19 Potentially vulnerable (14.2.19-r0)

ceph

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-base

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-bash-completion

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-common

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-dev

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-doc

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-fuse

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mds

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mgr-node

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mon

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mon-daemon

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-mon-tools

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-openrc

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-osd

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-osd-daemon

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-osd-tools

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-radosgw

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-user

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-utils

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph-volume

15.2.10 Potentially vulnerable (15.2.10-r0)

libcephfs

15.2.10 Potentially vulnerable (15.2.10-r0)

librados

15.2.10 Potentially vulnerable (15.2.10-r0)

libradosstriper

15.2.10 Potentially vulnerable (15.2.10-r0)

librbd

15.2.10 Potentially vulnerable (15.2.10-r0)

py3-cephfs

15.2.10 Potentially vulnerable (15.2.10-r0)

py3-rados

15.2.10 Potentially vulnerable (15.2.10-r0)

py3-rbd

15.2.10 Potentially vulnerable (15.2.10-r0)

rbd-fuse

15.2.10 Potentially vulnerable (15.2.10-r0)

rbd-mirror

15.2.10 Potentially vulnerable (15.2.10-r0)

rbd-nbd

15.2.10 Potentially vulnerable (15.2.10-r0)

ceph

16.2.0 (16.2.0-r1)

ceph-base

16.2.0 (16.2.0-r1)

ceph-bash-completion

16.2.0 (16.2.0-r1)

ceph-common

16.2.0 (16.2.0-r1)

ceph-dev

16.2.0 (16.2.0-r1)

ceph-doc

16.2.0 (16.2.0-r1)

ceph-fuse

16.2.0 (16.2.0-r1)

ceph-mds

16.2.0 (16.2.0-r1)

ceph-mgr

16.2.0 (16.2.0-r1)

ceph-mgr-node

16.2.0 (16.2.0-r1)

ceph-mon

16.2.0 (16.2.0-r1)

ceph-mon-daemon

16.2.0 (16.2.0-r1)

ceph-mon-tools

16.2.0 (16.2.0-r1)

ceph-openrc

16.2.0 (16.2.0-r1)

ceph-osd

16.2.0 (16.2.0-r1)

ceph-osd-daemon

16.2.0 (16.2.0-r1)

ceph-osd-tools

16.2.0 (16.2.0-r1)

ceph-radosgw

16.2.0 (16.2.0-r1)

ceph-user

16.2.0 (16.2.0-r1)

ceph-utils

16.2.0 (16.2.0-r1)

ceph-volume

16.2.0 (16.2.0-r1)

libcephfs

16.2.0 (16.2.0-r1)

librados

16.2.0 (16.2.0-r1)

libradosstriper

16.2.0 (16.2.0-r1)

librbd

16.2.0 (16.2.0-r1)

py3-cephfs

16.2.0 (16.2.0-r1)

py3-rados

16.2.0 (16.2.0-r1)

py3-rbd

16.2.0 (16.2.0-r1)

rbd-fuse

16.2.0 (16.2.0-r1)

rbd-mirror

16.2.0 (16.2.0-r1)

rbd-nbd

16.2.0 (16.2.0-r1)

ceph

14.2.19 Potentially vulnerable (14.2.19-alt1)

ceph

15.2.10 Potentially vulnerable (15.2.10-alt1)

ceph-common

10.2.5 Potentially vulnerable (1:10.2.5-4.amzn2.0.1)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-2.amzn2.0.1)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-2.amzn2.0.3)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph

15.2.8 Potentially vulnerable (1:15.2.8)
Arch
community

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
Arch
community

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
Arch
community

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)

ceph-git

12.1.0.1018.g171104cb93 (1:12.1.0.1018.g171104cb93-1)

cephadm

15.2.9 Potentially vulnerable (15.2.9-1)

cephadm-git

16.0.0.r3098.g33dd9ea3057 (16.0.0.r3098.g33dd9ea3057-1)
Artix
galaxy

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Artix
galaxy

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Artix
galaxy

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):

ceph

12.2.12 Potentially vulnerable (12.2.12-0ubuntu0.18.04.5)

ceph

12.2.12 Potentially vulnerable (12.2.12-0ubuntu0.18.04.5)

ceph-common

10.2.5 Potentially vulnerable (1:10.2.5-4.el7)
CentOS 8
AppStream

ceph

12.2.7 Potentially vulnerable (1:12.2.7-9.el8)
Chakra
desktop

ceph

12.2.1 Potentially vulnerable (12.2.1-1)
Deepin
main

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1.1-1+dde)

ceph

0.80.7 Potentially vulnerable (0.80.7-2+deb8u2)

ceph

10.2.11 Potentially vulnerable (10.2.11-2)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2.1)

sys-cluster/ceph

14.2.19 Potentially vulnerable (14.2.19-r1)
Fedora 26
release

ceph

10.2.7 Potentially vulnerable (1:10.2.7-2.fc26)
Fedora 27
updates

ceph

12.2.8 Potentially vulnerable (1:12.2.8-1.fc27)
Fedora 27
release

ceph

12.2.1 Potentially vulnerable (1:12.2.1-1.fc27)
Fedora 28
updates

ceph

12.2.12 Potentially vulnerable (1:12.2.12-1.fc28)
Fedora 28
release

ceph

12.2.4 Potentially vulnerable (1:12.2.4-1.fc28)
Fedora 29
updates

ceph

12.2.12 Potentially vulnerable (1:12.2.12-1.fc29)
Fedora 29
release

ceph

12.2.8 Potentially vulnerable (1:12.2.8-1.fc29)
Fedora 30
updates

ceph

14.2.9 Potentially vulnerable (2:14.2.9-1.fc30)
Fedora 30
release

ceph

14.2.0 Potentially vulnerable (2:14.2.0-1.fc30)
Fedora 31
updates

ceph

14.2.13 Potentially vulnerable (2:14.2.13-2.fc31)
Fedora 31
release

ceph

14.2.4 Potentially vulnerable (2:14.2.4-1.fc31)
Fedora 32
updates

ceph

14.2.19 Potentially vulnerable (2:14.2.19-1.fc32)
Fedora 32
release

ceph

14.2.8 Potentially vulnerable (2:14.2.8-1.fc32)
Fedora 33
updates

ceph

15.2.10 Potentially vulnerable (2:15.2.10-1.fc33)
Fedora 33
release

ceph

15.2.5 Potentially vulnerable (2:15.2.5-1.fc33)

ceph

16.2.0 (2:16.2.0-3.fc35)

net/ceph14

14.2.11 Potentially vulnerable (14.2.11_3)

sys-cluster/ceph

14.2.1 Potentially vulnerable

sys-cluster/ceph

13.2.6 Potentially vulnerable

sys-cluster/ceph

13.2.5 Potentially vulnerable (13.2.5-r4)

sys-cluster/ceph

12.2.12 Potentially vulnerable (12.2.12-r2)

sys-cluster/ceph

12.2.11 Potentially vulnerable

sys-cluster/ceph

12.2.8 Potentially vulnerable (12.2.8-r1)

sys-cluster/ceph

16.2.0

sys-cluster/ceph

15.2.10 Potentially vulnerable (15.2.10-r1)

sys-cluster/ceph

15.2.9 Potentially vulnerable (15.2.9-r1)

sys-cluster/ceph

14.2.19 Potentially vulnerable

sys-cluster/ceph

14.2.16 Potentially vulnerable (14.2.16-r3)

ceph

14.2.16 Potentially vulnerable
Hyperbola
extra

ceph

10.2.5 Potentially vulnerable (10.2.5-1.hyperbola3)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system, with logger recommendation and OpenRC support
  • License:
    • GPL
  • Links(s):

sys-cluster/ceph

15.2.10 Potentially vulnerable (15.2.10-r1)

sys-cluster/ceph

15.2.9 Potentially vulnerable (15.2.9-r1)

sys-cluster/ceph

14.2.18 Potentially vulnerable

sys-cluster/ceph

14.2.16 Potentially vulnerable (14.2.16-r3)

sys-cluster/ceph

16.2.0

sys-cluster/ceph

15.2.10 Potentially vulnerable (15.2.10-r1)

sys-cluster/ceph

15.2.9 Potentially vulnerable (15.2.9-r1)

sys-cluster/ceph

14.2.19 Potentially vulnerable

sys-cluster/ceph

14.2.16 Potentially vulnerable (14.2.16-r3)
Mageia 6
core/release

ceph

10.2.7 Potentially vulnerable (1:10.2.7-1.mga6)
  • Summary:
    User space components of the Ceph file system
  • Category:
    • System/Kernel and hardware
  • License:
    • LGPL-2.1 and CC-BY-SA-1.0 and GPL-2.0 and BSL-1.0 and GPL-2.0-with-autoconf-exception and BSD-3-Clause and MIT
  • Links(s):
Mageia 8
core/updates

ceph

15.2.9 Potentially vulnerable (15.2.9-1.mga8)
  • Summary:
    A scalable distributed storage file system
  • Category:
    • System/Libraries
  • License:
    • LGPLv2+
  • Links(s):
Mageia 8
core/release

ceph

15.2.8 Potentially vulnerable (15.2.8-2.mga8)
  • Summary:
    A scalable distributed storage file system
  • Category:
    • System/Libraries
  • License:
    • LGPLv2+
  • Links(s):
Mageia Cauldron
core/release

ceph

15.2.9 Potentially vulnerable (15.2.9-2.mga9)
Manjaro Stable
community

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Manjaro Stable
community

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Manjaro Stable
community

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Manjaro Testing
community

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Manjaro Testing
community

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):
Manjaro Testing
community

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)
  • Summary:
    Distributed, fault-tolerant storage platform delivering object, block, and file system
  • License:
    • GPL
  • Links(s):

ceph

15.2.8 Potentially vulnerable

ceph

15.2.8 Potentially vulnerable

ceph-client

15.2.8 Potentially vulnerable

ceph

15.2.10 Potentially vulnerable

ceph

15.2.10 Potentially vulnerable

ceph-client

15.2.10 Potentially vulnerable

ceph

12.2.8 Potentially vulnerable (2:12.2.8-6.oe1)
OpenMandriva 4.0
main/release

ceph

12.0.3 Potentially vulnerable (12.0.3-1)
OpenMandriva Cooker
main/release

ceph

12.0.3 Potentially vulnerable (12.0.3-1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.12 Potentially vulnerable (12.2.12+git.1555518691.67074fa839-27.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.11 Potentially vulnerable (12.2.11+git.1551961392.896835fd74-24.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.10 Potentially vulnerable (12.2.10+git.1544718327.fc6f0c7299-18.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.10 Potentially vulnerable (12.2.10+git.1549630712.bb089269ea-21.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.8 Potentially vulnerable (12.2.8+git.1536505967.080f2248ff-15.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.7 Potentially vulnerable (12.2.7+git.1531910353.c0ef85b854-12.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.5 Potentially vulnerable (12.2.5+git.1524775272.5e7ea8cf03-9.1)
openSUSE Leap 42.3
updates/oss

ceph

12.2.0 Potentially vulnerable (12.2.0+git.1504118058.706f78da1a-6.1)
openSUSE Leap 42.3
updates/oss

ceph

12.1.4 Potentially vulnerable (12.1.4+git.1502953626.155adb5253-3.3)

ceph

12.1.0 Potentially vulnerable (12.1.0+git.1498654198.20d6a47cc9-1.2)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.12 Potentially vulnerable (12.2.12+git.1555518691.67074fa839-27.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.11 Potentially vulnerable (12.2.11+git.1551961392.896835fd74-24.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.10 Potentially vulnerable (12.2.10+git.1544718327.fc6f0c7299-18.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.10 Potentially vulnerable (12.2.10+git.1549630712.bb089269ea-21.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.8 Potentially vulnerable (12.2.8+git.1536505967.080f2248ff-15.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.7 Potentially vulnerable (12.2.7+git.1531910353.c0ef85b854-12.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.5 Potentially vulnerable (12.2.5+git.1524775272.5e7ea8cf03-9.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.2.0 Potentially vulnerable (12.2.0+git.1504118058.706f78da1a-6.1)
openSUSE Leap 42.3
updates/oss

ceph-test

12.1.4 Potentially vulnerable (12.1.4+git.1502953626.155adb5253-3.3)

ceph-test

12.1.0 Potentially vulnerable (12.1.0+git.1498654198.20d6a47cc9-1.2)
openSUSE Leap 15.0
updates/oss

ceph

13.2.4.125 Potentially vulnerable (13.2.4.125+gad802694f5-lp150.2.3.1)

ceph

13.0.2.1874 Potentially vulnerable (13.0.2.1874+ge31585919b-lp150.1.2)
openSUSE Leap 15.0
updates/oss

ceph-test

13.2.4.125 Potentially vulnerable (13.2.4.125+gad802694f5-lp150.2.3.1)

ceph-test

13.0.2.1874 Potentially vulnerable (13.0.2.1874+ge31585919b-lp150.1.4)
openSUSE Leap 15.1
updates/oss

ceph

14.2.16.402 Potentially vulnerable (14.2.16.402+g7d47dbaf4d-lp151.2.31.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.13.450 Potentially vulnerable (14.2.13.450+g65ea1b614d-lp151.2.28.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.11.394 Potentially vulnerable (14.2.11.394+g9cbbc473c0-lp151.2.25.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.10.392 Potentially vulnerable (14.2.10.392+gb3a13b81cb-lp151.2.22.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.9.970 Potentially vulnerable (14.2.9.970+ged84cae0c9-lp151.2.19.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.9.969 Potentially vulnerable (14.2.9.969+g9917342dc8-lp151.2.16.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.5.389 Potentially vulnerable (14.2.5.389+gb0f23ac248-lp151.2.13.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.5.382 Potentially vulnerable (14.2.5.382+g8881d33957-lp151.2.10.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.5.380 Potentially vulnerable (14.2.5.380+g1387ceaf78-lp151.2.7.1)
openSUSE Leap 15.1
updates/oss

ceph

14.2.4.386 Potentially vulnerable (14.2.4.386+g73475e3ee1-lp151.2.4.1)

ceph

14.2.0.300 Potentially vulnerable (14.2.0.300+gacd2f2b9e1-lp151.1.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.16.402 Potentially vulnerable (14.2.16.402+g7d47dbaf4d-lp151.2.31.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.13.450 Potentially vulnerable (14.2.13.450+g65ea1b614d-lp151.2.28.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.11.394 Potentially vulnerable (14.2.11.394+g9cbbc473c0-lp151.2.25.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.10.392 Potentially vulnerable (14.2.10.392+gb3a13b81cb-lp151.2.22.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.9.970 Potentially vulnerable (14.2.9.970+ged84cae0c9-lp151.2.19.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.9.969 Potentially vulnerable (14.2.9.969+g9917342dc8-lp151.2.16.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.5.389 Potentially vulnerable (14.2.5.389+gb0f23ac248-lp151.2.13.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.5.382 Potentially vulnerable (14.2.5.382+g8881d33957-lp151.2.10.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.5.380 Potentially vulnerable (14.2.5.380+g1387ceaf78-lp151.2.7.1)
openSUSE Leap 15.1
updates/oss

ceph-test

14.2.4.386 Potentially vulnerable (14.2.4.386+g73475e3ee1-lp151.2.4.1)

ceph-test

14.2.0.300 Potentially vulnerable (14.2.0.300+gacd2f2b9e1-lp151.1.1)
openSUSE Leap 15.2
updates/oss

ceph

15.2.9.83 Potentially vulnerable (15.2.9.83+g4275378de0-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

ceph

15.2.8.80 Potentially vulnerable (15.2.8.80+g1f4b6229ca-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

ceph

15.2.7.689 Potentially vulnerable (15.2.7.689+g2c35e99e0a-lp152.2.6.1)
openSUSE Leap 15.2
updates/oss

ceph

15.2.5.667 Potentially vulnerable (15.2.5.667+g1a579d5bf2-lp152.2.3.1)

ceph

15.2.2.18 Potentially vulnerable (15.2.2.18+g1dbcddb5d8-lp152.1.1)
openSUSE Leap 15.2
updates/oss

ceph-test

15.2.9.83 Potentially vulnerable (15.2.9.83+g4275378de0-lp152.2.12.1)
openSUSE Leap 15.2
updates/oss

ceph-test

15.2.8.80 Potentially vulnerable (15.2.8.80+g1f4b6229ca-lp152.2.9.1)
openSUSE Leap 15.2
updates/oss

ceph-test

15.2.7.689 Potentially vulnerable (15.2.7.689+g2c35e99e0a-lp152.2.6.1)
openSUSE Leap 15.2
updates/oss

ceph-test

15.2.5.667 Potentially vulnerable (15.2.5.667+g1a579d5bf2-lp152.2.3.1)

ceph-test

15.2.2.18 Potentially vulnerable (15.2.2.18+g1dbcddb5d8-lp152.1.1)

ceph

15.2.8.80 Potentially vulnerable (15.2.8.80+g1f4b6229ca-3.13.1)

ceph-test

15.2.8.80 Potentially vulnerable (15.2.8.80+g1f4b6229ca-3.13.1)

ceph

16.2.0.91 (16.2.0.91+g24bd0c4acf-1.1)

ceph-test

16.2.0.91 (16.2.0.91+g24bd0c4acf-1.1)
Parabola
community

ceph

15.2.10 Potentially vulnerable (15.2.10-1)
Parabola
community

ceph-libs

15.2.10 Potentially vulnerable (15.2.10-1)
Parabola
community

ceph-mgr

15.2.10 Potentially vulnerable (15.2.10-1)

ceph

10.2.11 Potentially vulnerable (10.2.11-2)
Pardus 17
updates/main

ceph

10.2.11 Potentially vulnerable (10.2.11-2)
Pardus 17
updates/main

ceph

10.2.11 Potentially vulnerable (10.2.11-1)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2.1)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2.1)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2.1)

ceph

0.94.3 Potentially vulnerable (0.94.3-1)

ceph

12.2.11 Potentially vulnerable (12.2.11+dfsg1-2.1+rpi1)
Rosa 2019.1
main/release

ceph

15.2.7 Potentially vulnerable (15.2.7-1)
Rosa Server 7.3
base/release

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-1.res7)
Rosa Server 7.5
base/release

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-1.res7)
Rosa Server 7.5
base/release

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-2.res7)

ceph-common

10.2.5 Potentially vulnerable (1:10.2.5-4.el7)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-1.el7)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.94.5 Potentially vulnerable (1:0.94.5-2.el7)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.80.7 Potentially vulnerable (1:0.80.7-2.el7)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph-common

0.80.7 Potentially vulnerable (1:0.80.7-3.el7)
  • Summary:
    Ceph Common
  • Category:
    • System Environment/Base
  • License:
    • GPLv2
  • Links(s):

ceph

16.2.0
Trisquel 6.0
toutatis-updates/main

ceph

0.41 Potentially vulnerable (0.41-1ubuntu2.1)
Trisquel 6.0
toutatis/main

ceph

0.41 Potentially vulnerable (0.41-1ubuntu2)
Trisquel 7.0
belenos-updates/main

ceph

0.80.11 Potentially vulnerable (0.80.11-0ubuntu1.14.04.4)
Trisquel 7.0
belenos/main

ceph

0.79 Potentially vulnerable (0.79-0ubuntu1)
Trisquel 8.0
flidas-updates/main

ceph

10.2.11 Potentially vulnerable (10.2.11-0ubuntu0.16.04.3)
Trisquel 8.0
flidas/main

ceph

10.1.2 Potentially vulnerable (10.1.2-0ubuntu1)
Trisquel 9.0
etiona-updates/main

ceph

12.2.13 Potentially vulnerable (12.2.13-0ubuntu0.18.04.6)
Trisquel 9.0
etiona/main

ceph

12.2.4 Potentially vulnerable (12.2.4-0ubuntu1)

Ceph

15.0.0 Potentially vulnerable

Ceph

14.2.4 Potentially vulnerable

Ceph

13.2.6 Potentially vulnerable

Ceph

12.2.12 Potentially vulnerable