suse-su-2020:3257-1
Vulnerability from csaf_suse
Published
2020-11-20 11:14
Modified
2020-11-20 11:14
Summary
Security update for ceph, deepsea

Notes

Title of the patch
Security update for ceph, deepsea
Description of the patch
This update for ceph, deepsea fixes the following issues: - Update to 14.2.13-398-gb6c514eec7: + Upstream 14.2.13 release see https://ceph.io/releases/v14-2-13-nautilus-released/ * (bsc#1151612, bsc#1158257) ceph-volume: major batch refactor - Update to 14.2.12-436-g6feab505b7: + Upstream 14.2.12 release see https://ceph.io/releases/v14-2-12-nautilus-released/ * (bsc#1169134) mgr/dashboard: document Prometheus' security model * (bsc#1170487) monclient: schedule first tick using mon_client_hunt_interval * (bsc#1174591) mgr/dashboard: Unable to edit iSCSI logged-in client * (bsc#1174591) mgr/dashboard: Allow editing iSCSI targets with initiators logged-in * (bsc#1175061) os/bluestore: dump onode that has too many spanning blobs * (bsc#1175240) pybind/mgr/restful: use dict.items() for py3 compatible + (bsc#1175781) ceph-volume: lvmcache: print help correctly + spec: move python-enum34 into rhel 7 conditional - Update to 14.2.11-394-g9cbbc473c0: + Upstream 14.2.11 release see https://ceph.io/releases/v14-2-11-nautilus-released/ * mgr/progress: Skip pg_summary update if _events dict is empty (bsc#1167477) (bsc#1172142) (bsc#1171956) * mgr/dashboard: Allow to edit iSCSI target with active session (bsc#1173339) - Update to 14.2.10-392-gb3a13b81cb: + Upstream 14.2.10 release see https://ceph.io/releases/v14-2-10-nautilus-released/ * mgr: Improve internal python to c++ interface (bsc#1167477) - Update to 14.2.9-970-ged84cae0c9: + rgw: sanitize newlines in s3 CORSConfiguration's ExposeHeader (bsc#1171921, CVE-2020-10753) - Update to 14.2.9-969-g9917342dc8d: * rebase on top of upstream nautilus, SHA1 ccd9c04f88e53aef7e4f1068ce1221fa3b97450d * cmake: Improve test for 16-byte atomic support on IBM Z * (jsc#SES-680) monitoring: add details to Prometheus alerts * (bsc#1155045) mgr/dashboard: add debug mode, and accept expected exception when SSL handshaking * (bsc#1152100) monitoring: alert for prediction of disk and pool fill up broken * (bsc#1155262) mgr/dashboard: iSCSI targets not available if any gateway is down * (bsc#1159689) os/bluestore: more flexible DB volume space usage * (bsc#1156087) ceph-volume: make get_devices fs location independent * (bsc#1156409) monitoring: wait before firing osd full alert * (bsc#1160626) mgr/dashboard: Unable to remove an iSCSI gateway that is already in use * (bsc#1161718) mount.ceph: remove arbitrary limit on size of name= option * (bsc#1162553) ceph-volume: strip _dmcrypt suffix in simple scan json output * (bsc#1163119) mgr/dashboard: Not able to restrict bucket creation for new user * (bsc#1164571) mgr/dashboard: Prevent iSCSI target recreation when editing controls * (bsc#1165713) mgr/dashboard: Repair broken grafana panels * (bsc#1165835) rgw: get barbican secret key request maybe return error code * (bsc#1165840) rgw: making implicit_tenants backwards compatible * (bsc#1166297) mgr/dashboard: Repair broken grafana panels * (bsc#1166393) mgr/dashboard: KeyError on dashboard reload * (bsc#1166624) mgr/dashboard: Fix iSCSI's username and password validation * (bsc#1166670) monitoring: root volume full alert fires false positives * (bsc#1166932) mgr: synchronize ClusterState's health and mon_status * (bsc#1168403) mgr/dashboard: Add more debug information to Dashboard RGW backend * (bsc#1169356) rgw: reshard: skip stale bucket id entries from reshard queue * (bsc#1170938) mon/OSDMonitor: allow trimming maps even if osds are down * (bsc#1171367) Set OSD's bluefs-buffered-io param to false by default - Update to 14.2.13-398-gb6c514eec7: + Upstream 14.2.13 release see https://ceph.io/releases/v14-2-13-nautilus-released/ * (bsc#1151612, bsc#1158257) ceph-volume: major batch refactor - Update to 14.2.12-436-g6feab505b7: + Upstream 14.2.12 release see https://ceph.io/releases/v14-2-12-nautilus-released/ * (bsc#1169134) mgr/dashboard: document Prometheus' security model * (bsc#1170487) monclient: schedule first tick using mon_client_hunt_interval * (bsc#1174591) mgr/dashboard: Unable to edit iSCSI logged-in client * (bsc#1174591) mgr/dashboard: Allow editing iSCSI targets with initiators logged-in * (bsc#1175061) os/bluestore: dump onode that has too many spanning blobs * (bsc#1175240) pybind/mgr/restful: use dict.items() for py3 compatible + (bsc#1175781) ceph-volume: lvmcache: print help correctly + spec: move python-enum34 into rhel 7 conditional - Update to 14.2.11-394-g9cbbc473c0: + Upstream 14.2.11 release see https://ceph.io/releases/v14-2-11-nautilus-released/ * mgr/progress: Skip pg_summary update if _events dict is empty (bsc#1167477) (bsc#1172142) (bsc#1171956) * mgr/dashboard: Allow to edit iSCSI target with active session (bsc#1173339) - Update to 14.2.10-392-gb3a13b81cb: + Upstream 14.2.10 release see https://ceph.io/releases/v14-2-10-nautilus-released/ * mgr: Improve internal python to c++ interface (bsc#1167477) - Update to 14.2.9-970-ged84cae0c9: + rgw: sanitize newlines in s3 CORSConfiguration's ExposeHeader (bsc#1171921, CVE-2020-10753) - Update to 14.2.9-969-g9917342dc8d: * rebase on top of upstream nautilus, SHA1 ccd9c04f88e53aef7e4f1068ce1221fa3b97450d * cmake: Improve test for 16-byte atomic support on IBM Z * (jsc#SES-680) monitoring: add details to Prometheus alerts * (bsc#1155045) mgr/dashboard: add debug mode, and accept expected exception when SSL handshaking * (bsc#1152100) monitoring: alert for prediction of disk and pool fill up broken * (bsc#1155262) mgr/dashboard: iSCSI targets not available if any gateway is down * (bsc#1159689) os/bluestore: more flexible DB volume space usage * (bsc#1156087) ceph-volume: make get_devices fs location independent * (bsc#1156409) monitoring: wait before firing osd full alert * (bsc#1160626) mgr/dashboard: Unable to remove an iSCSI gateway that is already in use * (bsc#1161718) mount.ceph: remove arbitrary limit on size of name= option * (bsc#1162553) ceph-volume: strip _dmcrypt suffix in simple scan json output * (bsc#1163119) mgr/dashboard: Not able to restrict bucket creation for new user * (bsc#1164571) mgr/dashboard: Prevent iSCSI target recreation when editing controls * (bsc#1165713) mgr/dashboard: Repair broken grafana panels * (bsc#1165835) rgw: get barbican secret key request maybe return error code * (bsc#1165840) rgw: making implicit_tenants backwards compatible * (bsc#1166297) mgr/dashboard: Repair broken grafana panels * (bsc#1166393) mgr/dashboard: KeyError on dashboard reload * (bsc#1166624) mgr/dashboard: Fix iSCSI's username and password validation * (bsc#1166670) monitoring: root volume full alert fires false positives * (bsc#1166932) mgr: synchronize ClusterState's health and mon_status * (bsc#1168403) mgr/dashboard: Add more debug information to Dashboard RGW backend * (bsc#1169356) rgw: reshard: skip stale bucket id entries from reshard queue * (bsc#1170938) mon/OSDMonitor: allow trimming maps even if osds are down * (bsc#1171367) Set OSD's bluefs-buffered-io param to false by default - Version: 0.9.33 - drop workarounds for old ceph-volume lvm batch command - runners/upgrade: Add SES6->7 pre-upgrade checks
Patchnames
SUSE-2020-3257,SUSE-Storage-6-2020-3257
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ceph, deepsea",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for ceph, deepsea fixes the following issues:\n\n- Update to 14.2.13-398-gb6c514eec7:\n  + Upstream 14.2.13 release\n    see https://ceph.io/releases/v14-2-13-nautilus-released/\n    * (bsc#1151612, bsc#1158257) ceph-volume: major batch refactor   \n\n- Update to 14.2.12-436-g6feab505b7:\n  + Upstream 14.2.12 release\n    see https://ceph.io/releases/v14-2-12-nautilus-released/\n    * (bsc#1169134) mgr/dashboard: document Prometheus\u0027 security model\n    * (bsc#1170487) monclient: schedule first tick using mon_client_hunt_interval\n    * (bsc#1174591) mgr/dashboard: Unable to edit iSCSI logged-in client\n    * (bsc#1174591) mgr/dashboard: Allow editing iSCSI targets with initiators logged-in\n    * (bsc#1175061) os/bluestore: dump onode that has too many spanning blobs\n    * (bsc#1175240) pybind/mgr/restful: use dict.items() for py3 compatible\n  + (bsc#1175781) ceph-volume: lvmcache: print help correctly\n  + spec: move python-enum34 into rhel 7 conditional\n\n- Update to 14.2.11-394-g9cbbc473c0:\n  + Upstream 14.2.11 release\n    see https://ceph.io/releases/v14-2-11-nautilus-released/\n    * mgr/progress: Skip pg_summary update if _events dict is empty\n      (bsc#1167477) (bsc#1172142) (bsc#1171956)\n    * mgr/dashboard: Allow to edit iSCSI target with active session\n      (bsc#1173339)\n\n- Update to 14.2.10-392-gb3a13b81cb:\n  + Upstream 14.2.10 release\n    see https://ceph.io/releases/v14-2-10-nautilus-released/\n    * mgr: Improve internal python to c++ interface (bsc#1167477)\n\n- Update to 14.2.9-970-ged84cae0c9: \n  + rgw: sanitize newlines in s3 CORSConfiguration\u0027s ExposeHeader\n    (bsc#1171921, CVE-2020-10753) \n\n- Update to 14.2.9-969-g9917342dc8d:\n  * rebase on top of upstream nautilus, SHA1 ccd9c04f88e53aef7e4f1068ce1221fa3b97450d\n  * cmake: Improve test for 16-byte atomic support on IBM Z\n  * (jsc#SES-680) monitoring: add details to Prometheus alerts\n  * (bsc#1155045) mgr/dashboard: add debug mode, and accept expected exception when SSL handshaking\n  * (bsc#1152100) monitoring: alert for prediction of disk and pool fill up broken\n  * (bsc#1155262) mgr/dashboard: iSCSI targets not available if any gateway is down\n  * (bsc#1159689) os/bluestore: more flexible DB volume space usage\n  * (bsc#1156087) ceph-volume: make get_devices fs location independent\n  * (bsc#1156409) monitoring: wait before firing osd full alert\n  * (bsc#1160626) mgr/dashboard: Unable to remove an iSCSI gateway that is already in use\n  * (bsc#1161718) mount.ceph: remove arbitrary limit on size of name= option\n  * (bsc#1162553) ceph-volume: strip _dmcrypt suffix in simple scan json output\n  * (bsc#1163119) mgr/dashboard: Not able to restrict bucket creation for new user\n  * (bsc#1164571) mgr/dashboard: Prevent iSCSI target recreation when editing controls\n  * (bsc#1165713) mgr/dashboard: Repair broken grafana panels\n  * (bsc#1165835) rgw: get barbican secret key request maybe return error code\n  * (bsc#1165840) rgw: making implicit_tenants backwards compatible\n  * (bsc#1166297) mgr/dashboard: Repair broken grafana panels\n  * (bsc#1166393) mgr/dashboard: KeyError on dashboard reload\n  * (bsc#1166624) mgr/dashboard: Fix iSCSI\u0027s username and password validation\n  * (bsc#1166670) monitoring: root volume full alert fires false positives\n  * (bsc#1166932) mgr: synchronize ClusterState\u0027s health and mon_status\n  * (bsc#1168403) mgr/dashboard: Add more debug information to Dashboard RGW backend \n  * (bsc#1169356) rgw: reshard: skip stale bucket id entries from reshard queue\n  * (bsc#1170938) mon/OSDMonitor: allow trimming maps even if osds are down\n  * (bsc#1171367) Set OSD\u0027s bluefs-buffered-io param to false by default\n\n- Update to 14.2.13-398-gb6c514eec7:\n  + Upstream 14.2.13 release\n    see https://ceph.io/releases/v14-2-13-nautilus-released/\n    * (bsc#1151612, bsc#1158257) ceph-volume: major batch refactor\n    \n\n- Update to 14.2.12-436-g6feab505b7:\n  + Upstream 14.2.12 release\n    see https://ceph.io/releases/v14-2-12-nautilus-released/\n    * (bsc#1169134) mgr/dashboard: document Prometheus\u0027 security model\n    * (bsc#1170487) monclient: schedule first tick using mon_client_hunt_interval\n    * (bsc#1174591) mgr/dashboard: Unable to edit iSCSI logged-in client\n    * (bsc#1174591) mgr/dashboard: Allow editing iSCSI targets with initiators logged-in\n    * (bsc#1175061) os/bluestore: dump onode that has too many spanning blobs\n    * (bsc#1175240) pybind/mgr/restful: use dict.items() for py3 compatible\n  + (bsc#1175781) ceph-volume: lvmcache: print help correctly\n  + spec: move python-enum34 into rhel 7 conditional\n\n- Update to 14.2.11-394-g9cbbc473c0:\n  + Upstream 14.2.11 release\n    see https://ceph.io/releases/v14-2-11-nautilus-released/\n    * mgr/progress: Skip pg_summary update if _events dict is empty\n      (bsc#1167477) (bsc#1172142) (bsc#1171956)\n    * mgr/dashboard: Allow to edit iSCSI target with active session\n      (bsc#1173339)\n\n- Update to 14.2.10-392-gb3a13b81cb:\n  + Upstream 14.2.10 release\n    see https://ceph.io/releases/v14-2-10-nautilus-released/\n    * mgr: Improve internal python to c++ interface (bsc#1167477)\n\n- Update to 14.2.9-970-ged84cae0c9: \n  + rgw: sanitize newlines in s3 CORSConfiguration\u0027s ExposeHeader\n    (bsc#1171921, CVE-2020-10753) \n\n- Update to 14.2.9-969-g9917342dc8d:\n  * rebase on top of upstream nautilus, SHA1 ccd9c04f88e53aef7e4f1068ce1221fa3b97450d\n  * cmake: Improve test for 16-byte atomic support on IBM Z\n  * (jsc#SES-680) monitoring: add details to Prometheus alerts\n  * (bsc#1155045) mgr/dashboard: add debug mode, and accept expected exception when SSL handshaking\n  * (bsc#1152100) monitoring: alert for prediction of disk and pool fill up broken\n  * (bsc#1155262) mgr/dashboard: iSCSI targets not available if any gateway is down\n  * (bsc#1159689) os/bluestore: more flexible DB volume space usage\n  * (bsc#1156087) ceph-volume: make get_devices fs location independent\n  * (bsc#1156409) monitoring: wait before firing osd full alert\n  * (bsc#1160626) mgr/dashboard: Unable to remove an iSCSI gateway that is already in use\n  * (bsc#1161718) mount.ceph: remove arbitrary limit on size of name= option\n  * (bsc#1162553) ceph-volume: strip _dmcrypt suffix in simple scan json output\n  * (bsc#1163119) mgr/dashboard: Not able to restrict bucket creation for new user\n  * (bsc#1164571) mgr/dashboard: Prevent iSCSI target recreation when editing controls\n  * (bsc#1165713) mgr/dashboard: Repair broken grafana panels\n  * (bsc#1165835) rgw: get barbican secret key request maybe return error code\n  * (bsc#1165840) rgw: making implicit_tenants backwards compatible\n  * (bsc#1166297) mgr/dashboard: Repair broken grafana panels\n  * (bsc#1166393) mgr/dashboard: KeyError on dashboard reload\n  * (bsc#1166624) mgr/dashboard: Fix iSCSI\u0027s username and password validation\n  * (bsc#1166670) monitoring: root volume full alert fires false positives\n  * (bsc#1166932) mgr: synchronize ClusterState\u0027s health and mon_status\n  * (bsc#1168403) mgr/dashboard: Add more debug information to Dashboard RGW backend \n  * (bsc#1169356) rgw: reshard: skip stale bucket id entries from reshard queue\n  * (bsc#1170938) mon/OSDMonitor: allow trimming maps even if osds are down\n  * (bsc#1171367) Set OSD\u0027s bluefs-buffered-io param to false by default\n\n- Version: 0.9.33\n- drop workarounds for old ceph-volume lvm batch command\n\n- runners/upgrade: Add SES6-\u003e7 pre-upgrade checks",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-3257,SUSE-Storage-6-2020-3257",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3257-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:3257-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203257-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:3257-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007733.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1151612",
        "url": "https://bugzilla.suse.com/1151612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152100",
        "url": "https://bugzilla.suse.com/1152100"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155045",
        "url": "https://bugzilla.suse.com/1155045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155262",
        "url": "https://bugzilla.suse.com/1155262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156087",
        "url": "https://bugzilla.suse.com/1156087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156409",
        "url": "https://bugzilla.suse.com/1156409"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158257",
        "url": "https://bugzilla.suse.com/1158257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159689",
        "url": "https://bugzilla.suse.com/1159689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160626",
        "url": "https://bugzilla.suse.com/1160626"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161718",
        "url": "https://bugzilla.suse.com/1161718"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162553",
        "url": "https://bugzilla.suse.com/1162553"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163119",
        "url": "https://bugzilla.suse.com/1163119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164571",
        "url": "https://bugzilla.suse.com/1164571"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165713",
        "url": "https://bugzilla.suse.com/1165713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165835",
        "url": "https://bugzilla.suse.com/1165835"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165840",
        "url": "https://bugzilla.suse.com/1165840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166297",
        "url": "https://bugzilla.suse.com/1166297"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166393",
        "url": "https://bugzilla.suse.com/1166393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166624",
        "url": "https://bugzilla.suse.com/1166624"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166670",
        "url": "https://bugzilla.suse.com/1166670"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166932",
        "url": "https://bugzilla.suse.com/1166932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167477",
        "url": "https://bugzilla.suse.com/1167477"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168403",
        "url": "https://bugzilla.suse.com/1168403"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169134",
        "url": "https://bugzilla.suse.com/1169134"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1169356",
        "url": "https://bugzilla.suse.com/1169356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170487",
        "url": "https://bugzilla.suse.com/1170487"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1170938",
        "url": "https://bugzilla.suse.com/1170938"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171367",
        "url": "https://bugzilla.suse.com/1171367"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171921",
        "url": "https://bugzilla.suse.com/1171921"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1171956",
        "url": "https://bugzilla.suse.com/1171956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1172142",
        "url": "https://bugzilla.suse.com/1172142"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1173339",
        "url": "https://bugzilla.suse.com/1173339"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174591",
        "url": "https://bugzilla.suse.com/1174591"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175061",
        "url": "https://bugzilla.suse.com/1175061"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175240",
        "url": "https://bugzilla.suse.com/1175240"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175781",
        "url": "https://bugzilla.suse.com/1175781"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-10753 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-10753/"
      }
    ],
    "title": "Security update for ceph, deepsea",
    "tracking": {
      "current_release_date": "2020-11-20T11:14:55Z",
      "generator": {
        "date": "2020-11-20T11:14:55Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:3257-1",
      "initial_release_date": "2020-11-20T11:14:55Z",
      "revision_history": [
        {
          "date": "2020-11-20T11:14:55Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ceph-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librados2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librados2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librados2-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                "product": {
                  "name": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64",
                  "product_id": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ceph-dashboard-e2e-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-dashboard-e2e-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-dashboard-e2e-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-grafana-dashboards-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-grafana-dashboards-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-grafana-dashboards-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-dashboard-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-dashboard-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-dashboard-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-diskprediction-cloud-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-diskprediction-cloud-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-diskprediction-cloud-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-diskprediction-local-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-diskprediction-local-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-diskprediction-local-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-k8sevents-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-k8sevents-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-k8sevents-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-rook-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-rook-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-rook-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-ssh-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-mgr-ssh-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-mgr-ssh-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-prometheus-alerts-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                "product": {
                  "name": "ceph-prometheus-alerts-14.2.13.398+gb6c514eec7-3.20.1.noarch",
                  "product_id": "ceph-prometheus-alerts-14.2.13.398+gb6c514eec7-3.20.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                "product": {
                  "name": "deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                  "product_id": "deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                "product": {
                  "name": "deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                  "product_id": "deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "deepsea-qa-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                "product": {
                  "name": "deepsea-qa-0.9.33+git.0.ed16d26e-3.27.1.noarch",
                  "product_id": "deepsea-qa-0.9.33+git.0.ed16d26e-3.27.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ceph-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-base-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-common-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-mds-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-mgr-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-mon-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-osd-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "ceph-radosgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "cephfs-shell-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "libcephfs-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "libcephfs2-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librados-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librados2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librados2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librados2-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "libradospp-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librbd-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librbd1-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librgw-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "librgw2-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "python3-ceph-argparse-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "python3-cephfs-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "python3-rados-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "python3-rbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "python3-rgw-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "rados-objclass-devel-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "rbd-fuse-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "rbd-mirror-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                "product": {
                  "name": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64",
                  "product_id": "rbd-nbd-14.2.13.398+gb6c514eec7-3.20.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 6",
                "product": {
                  "name": "SUSE Enterprise Storage 6",
                  "product_id": "SUSE Enterprise Storage 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch"
        },
        "product_reference": "deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch as component of SUSE Enterprise Storage 6",
          "product_id": "SUSE Enterprise Storage 6:deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch"
        },
        "product_reference": "deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch",
        "relates_to_product_reference": "SUSE Enterprise Storage 6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-10753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-10753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. Ceph versions 3.x and 4.x are vulnerable to this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 6:deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
          "SUSE Enterprise Storage 6:deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-10753",
          "url": "https://www.suse.com/security/cve/CVE-2020-10753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1171921 for CVE-2020-10753",
          "url": "https://bugzilla.suse.com/1171921"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 6:deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
            "SUSE Enterprise Storage 6:deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 6:deepsea-0.9.33+git.0.ed16d26e-3.27.1.noarch",
            "SUSE Enterprise Storage 6:deepsea-cli-0.9.33+git.0.ed16d26e-3.27.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-11-20T11:14:55Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-10753"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…