Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:0745", "cpe": "cpe:/a:redhat:ceph_storage:5.3::el8", "package": "ceph-2:16.2.10-248.el9cp", "product_name": "Red Hat Ceph Storage 5.3", "release_date": "2024-02-08T00:00:00Z"}, {"advisory": "RHSA-2024:0745", "cpe": "cpe:/a:redhat:ceph_storage:5.3::el8", "package": "ceph-ansible-0:6.0.28.7-1.el8cp", "product_name": "Red Hat Ceph Storage 5.3", "release_date": "2024-02-08T00:00:00Z"}, {"advisory": "RHSA-2024:0745", "cpe": "cpe:/a:redhat:ceph_storage:5.3::el8", "package": "haproxy-0:2.2.19-5.el8cp", "product_name": "Red Hat Ceph Storage 5.3", "release_date": "2024-02-08T00:00:00Z"}, {"advisory": "RHSA-2023:5693", "cpe": "cpe:/a:redhat:ceph_storage:6.1::el9", "package": "ceph-2:17.2.6-148.el9cp", "product_name": "Red Hat Ceph Storage 6.1", "release_date": "2023-10-12T00:00:00Z"}, {"advisory": "RHSA-2023:5693", "cpe": "cpe:/a:redhat:ceph_storage:6.1::el9", "package": "cephadm-ansible-0:3.0.0-1.el9cp", "product_name": "Red Hat Ceph Storage 6.1", "release_date": "2023-10-12T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "ceph-2:19.2.1-222.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "cephadm-ansible-1:4.1.4-1.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}, {"advisory": "RHSA-2025:9775", "cpe": "cpe:/a:redhat:ceph_storage:8.1::el9", "package": "oath-toolkit-0:2.6.12-1.el9cp", "product_name": "Red Hat Ceph Storage 8.1", "release_date": "2025-06-26T00:00:00Z"}], "bugzilla": {"description": "ceph: RGW crash upon misconfigured CORS rule", "id": "2215374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215374"}, "csaw": false, "cvss3": {"cvss3_base_score": "2.6", "cvss3_scoring_vector": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "status": "verified"}, "cwe": "CWE-20", "details": ["IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW. IBM X-Force ID: 268906.", "A flaw was found in Ceph. Certain misconfigurations of CORS rules in Ceph could result in a significantly large memory allocation. This issue can lead to RGW crashing and a denial of service from an authenticated user on the network."], "name": "CVE-2023-46159", "package_state": [{"cpe": "cpe:/a:redhat:ceph_storage:3", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Ceph Storage 3"}, {"cpe": "cpe:/a:redhat:ceph_storage:4", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Ceph Storage 4"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/a:redhat:openshift_container_storage:4", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Openshift Container Storage 4"}, {"cpe": "cpe:/a:redhat:openshift_data_foundation:4", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat Openshift Data Foundation 4"}, {"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Not affected", "package_name": "ceph", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}], "public_date": "2023-10-03T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-46159\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-46159"], "statement": "Red Hat Enterprise Linux does not ship RGW, only the associated client libraries. Hence, versions of Ceph shipped in RHEL are not affected by this flaw.", "threat_severity": "Low"}