USN-4035-1: Ceph vulnerabilities

USN-4035-1: Ceph vulnerabilities

ceph vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 19.04
  • Ubuntu 18.10
  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in Ceph.

Software Description

  • ceph – distributed storage and file system

Details

It was discovered that Ceph incorrectly handled read only permissions. An
authenticated attacker could use this issue to obtain dm-crypt encryption
keys. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-14662)

It was discovered that Ceph incorrectly handled certain OMAPs holding
bucket indices. An authenticated attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 16.04 LTS.
(CVE-2018-16846)

It was discovered that Ceph incorrectly sanitized certain debug logs. A
local attacker could possibly use this issue to obtain encryption key
information. This issue was only addressed in Ubuntu 18.10 and Ubuntu
19.04. (CVE-2018-16889)

It was discovered that Ceph incorrectly handled certain civetweb requests.
A remote attacker could possibly use this issue to consume resources,
leading to a denial of service. This issue only affected Ubuntu 18.10 and
Ubuntu 19.04. (CVE-2019-3821)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.04
ceph13.2.4+dfsg1-0ubuntu2.1
ceph-common13.2.4+dfsg1-0ubuntu2.1
Ubuntu 18.10
ceph13.2.4+dfsg1-0ubuntu0.18.10.2
ceph-common13.2.4+dfsg1-0ubuntu0.18.10.2
Ubuntu 16.04 LTS
ceph10.2.11-0ubuntu0.16.04.2
ceph-common10.2.11-0ubuntu0.16.04.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

Source: USN-4035-1: Ceph vulnerabilities

About KENNETH 11320 Articles
지락문화예술공작단

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.