CVE-2018-10861

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html Third Party Advisory
http://tracker.ceph.com/issues/24838 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/104742 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2177 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2179 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2261 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2274 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1593308 Issue Tracking Patch Third Party Advisory
https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc Patch Third Party Advisory
https://www.debian.org/security/2018/dsa-4339 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html Third Party Advisory
http://tracker.ceph.com/issues/24838 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/104742 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2177 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2179 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2261 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2274 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1593308 Issue Tracking Patch Third Party Advisory
https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc Patch Third Party Advisory
https://www.debian.org/security/2018/dsa-4339 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html - Third Party Advisory
References () http://tracker.ceph.com/issues/24838 - Issue Tracking, Vendor Advisory () http://tracker.ceph.com/issues/24838 - Issue Tracking, Vendor Advisory
References () http://www.securityfocus.com/bid/104742 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104742 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:2177 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2177 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2179 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2179 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2261 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2261 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2274 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2274 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1593308 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1593308 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc - Patch, Third Party Advisory () https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc - Patch, Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4339 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4339 - Third Party Advisory

Information

Published : 2018-07-10 14:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10861

Mitre link : CVE-2018-10861

CVE.ORG link : CVE-2018-10861


JSON object : View

Products Affected

debian

  • debian_linux

ceph

  • ceph

redhat

  • ceph_storage_osd
  • ceph_storage
  • enterprise_linux_workstation
  • enterprise_linux_server
  • ceph_storage_mon
  • enterprise_linux_desktop

opensuse

  • leap
CWE
CWE-285

Improper Authorization

CWE-287

Improper Authentication