First published: Wed Jun 20 2018(Updated: )
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, and corrupt snapshot images. This would require user to have read access and for that user must have key for authentication. It would only affect snapshots and images. So attacker with read access will only be able to corrupt data of snapshot images and rest of the ceph cluster should work as it is. Affect on integrity would be low and availability part can be controlled by mitigation using 'mon_allow_pool_delete = false' in ceph.conf to disable deletion of pools
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ceph | 12.2.11+dfsg1-2.1 12.2.11+dfsg1-2.1+deb10u1 14.2.21-1 16.2.11+ds-2 16.2.11+ds-5 | |
redhat/ceph | <10.2.11 | 10.2.11 |
redhat/ceph | <12.2.6 | 12.2.6 |
redhat/ceph | <13.2.1 | 13.2.1 |
Ceph Ceph | =10.2.0 | |
Ceph Ceph | =10.2.1 | |
Ceph Ceph | =10.2.2 | |
Ceph Ceph | =10.2.3 | |
Ceph Ceph | =10.2.4 | |
Ceph Ceph | =10.2.5 | |
Ceph Ceph | =10.2.6 | |
Ceph Ceph | =10.2.7 | |
Ceph Ceph | =10.2.8 | |
Ceph Ceph | =10.2.9 | |
Ceph Ceph | =10.2.10 | |
Ceph Ceph | =10.2.11 | |
Ceph Ceph | =12.2.0 | |
Ceph Ceph | =12.2.1 | |
Ceph Ceph | =12.2.2 | |
Ceph Ceph | =12.2.3 | |
Ceph Ceph | =12.2.4 | |
Ceph Ceph | =12.2.5 | |
Ceph Ceph | =12.2.6 | |
Ceph Ceph | =12.2.7 | |
Ceph Ceph | =13.2.0 | |
Ceph Ceph | =13.2.1 | |
Redhat Ceph Storage | =3 | |
Redhat Ceph Storage Mon | =2 | |
Redhat Ceph Storage Mon | =3 | |
Redhat Ceph Storage Osd | =2 | |
Redhat Ceph Storage Osd | =3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
openSUSE Leap | =15.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10861.
The severity of CVE-2018-10861 is high with a CVSS score of 8.1.
Ceph versions 10.2.11, 12.2.6, and 13.2.1 are affected by CVE-2018-10861.
An authenticated ceph user with read access can delete, create ceph storage pools, and corrupt snapshot images.
You can find more information about CVE-2018-10861 in the following references: [Reference 1](http://tracker.ceph.com/issues/24838), [Reference 2](https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc), [Reference 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1599407).