Debian Security Advisory DSA 4339-1 (ceph - security update)

Published: 2018-11-12 23:00:00
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:P

Solution Type:
Vendor Patch

Detection Type:
Linux Distribution Package

Affected Versions:
ceph on Debian Linux

Recommendations:
For the stable distribution (stretch), these problems have been fixed in version 10.2.11-1. We recommend that you upgrade your ceph Linux Distribution Packages. For the detailed security status of ceph please refer to its security tracker page linked in the references.

Summary:
Multiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was suspectible to replay attacks and calculated signatures incorrectly, ceph mon did not validate capabilities for pool operations (resulting in potential corruption or deletion of snapshot images) and a format string vulnerability in libradosstriper could result in denial of service.

Detection Method:
This check tests the installed software version using the apt Linux Distribution Package manager.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2017-7519
https://nvd.nist.gov/vuln/detail/CVE-2018-10861
https://nvd.nist.gov/vuln/detail/CVE-2018-1128
https://nvd.nist.gov/vuln/detail/CVE-2018-1129

References:

https://www.debian.org/security/2018/dsa-4339.html
https://security-tracker.debian.org/tracker/ceph

Search
Severity
Medium
CVSS Score
5.5

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.