First published: Tue Mar 17 2020(Updated: )
Or Friedman discovered that Ceph incorrectly handled disconnects. A remote authenticated attacker could possibly use this issue to cause Ceph to consume resources, leading to a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ceph | <14.2.4-0ubuntu0.19.10.2 | 14.2.4-0ubuntu0.19.10.2 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/ceph-base | <14.2.4-0ubuntu0.19.10.2 | 14.2.4-0ubuntu0.19.10.2 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/ceph-common | <14.2.4-0ubuntu0.19.10.2 | 14.2.4-0ubuntu0.19.10.2 |
Ubuntu Ubuntu | =19.10 | |
All of | ||
ubuntu/ceph | <12.2.12-0ubuntu0.18.04.5 | 12.2.12-0ubuntu0.18.04.5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/ceph-base | <12.2.12-0ubuntu0.18.04.5 | 12.2.12-0ubuntu0.18.04.5 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/ceph-common | <12.2.12-0ubuntu0.18.04.5 | 12.2.12-0ubuntu0.18.04.5 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Ceph vulnerability is USN-4304-1.
The Ceph vulnerability was discovered by Or Friedman.
The Ceph vulnerability can allow a remote authenticated attacker to cause a denial of service by consuming resources.
The Ceph vulnerability affects versions 14.2.4-0ubuntu0.19.10.2 and 12.2.12-0ubuntu0.18.04.5 of the ceph, ceph-base, and ceph-common packages on Ubuntu 19.10 and Ubuntu 18.04.
To fix the Ceph vulnerability, update the affected packages to version 14.2.4-0ubuntu0.19.10.2 for Ubuntu 19.10 or version 12.2.12-0ubuntu0.18.04.5 for Ubuntu 18.04.