A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-07-10 14:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10861
Mitre link : CVE-2018-10861
CVE.ORG link : CVE-2018-10861
JSON object : View
Products Affected
redhat
- ceph_storage
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
- ceph_storage_mon
- ceph_storage_osd
opensuse
- leap
debian
- debian_linux
ceph
- ceph