CVE-2018-10861

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html Third Party Advisory
http://tracker.ceph.com/issues/24838 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/104742 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2177 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2179 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2261 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2274 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1593308 Issue Tracking Patch Third Party Advisory
https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc Patch Third Party Advisory
https://www.debian.org/security/2018/dsa-4339 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html Third Party Advisory
http://tracker.ceph.com/issues/24838 Issue Tracking Vendor Advisory
http://www.securityfocus.com/bid/104742 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:2177 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2179 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2261 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2274 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1593308 Issue Tracking Patch Third Party Advisory
https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc Patch Third Party Advisory
https://www.debian.org/security/2018/dsa-4339 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-10 14:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10861

Mitre link : CVE-2018-10861

CVE.ORG link : CVE-2018-10861


JSON object : View

Products Affected

redhat

  • ceph_storage
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation
  • ceph_storage_mon
  • ceph_storage_osd

opensuse

  • leap

debian

  • debian_linux

ceph

  • ceph
CWE
CWE-285

Improper Authorization

CWE-287

Improper Authentication