RHSA-2018:2274
Vulnerability from csaf_redhat
Published
2018-07-26 15:35
Modified
2024-11-15 00:34
Summary
Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update

Notes

Topic
An update for ceph is now available for Red Hat Ceph Storage 2.5 for Ubuntu 16.04. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es): * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score and other related information refer to the CVE page(s) listed in the Reference section. Enhancement(s): * Ceph OSDs now log when they shutdown due to disk operations timing out by default. (BZ#1568897) * The `radosgw-admin orphans find` command can inadvertently remove data objects still in use, if followed by another operation, such as, a `rados rm` command. Users are now warned before attempting to produce lists of potentially orphaned objects. (BZ#1573656) * The 'ceph-osdomap-tool' now has a 'compact' command to perform offline compaction on an OSD's 'omap' directory. (BZ#1574231) * For S3 and Swift protocols, an option to list buckets/containers in natural (partial) order has been added. Listing containers in sorted order is canonical in both protocols, but is costly, and not required by some client applications. The performance and workload cost of S3 and Swift bucket/container listings is reduced for sharded buckets/containers when the `allow_unordered` extension is used. (BZ#1595374) * An asynchronous mechanism for executing the Ceph Object Gateway garbage collection using the `librados` APIs has been introduced. The original garbage collection mechanism serialized all processing, and lagged behind applications in specific workloads. Garbage collection performance has been significantly improved, and can be tuned to specific site requirements. (BZ#1595383) Bug Fix(es): These updated Ceph packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage 2.5 Release Notes for information on the most significant bug fixes for this release: https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for ceph is now available for Red Hat Ceph Storage 2.5 for Ubuntu 16.04.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform\nthat combines the most stable version of the Ceph storage system with a\nCeph management platform, deployment utilities, and support services.\n\nSecurity Fix(es):\n\n* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)\n\n* ceph: cephx uses weak signatures (CVE-2018-1129)\n\n* ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore and other related information refer to the CVE page(s) listed in the\nReference section.\n\nEnhancement(s):\n\n* Ceph OSDs now log when they shutdown due to disk operations timing out by\ndefault. (BZ#1568897)\n\n* The `radosgw-admin orphans find` command can inadvertently remove data objects still in use, if followed by another operation, such as, a `rados rm` command. Users are now warned before attempting to produce lists of potentially orphaned objects. (BZ#1573656)\n\n* The \u0027ceph-osdomap-tool\u0027 now has a \u0027compact\u0027 command to perform offline\ncompaction on an OSD\u0027s \u0027omap\u0027 directory. (BZ#1574231)\n\n* For S3 and Swift protocols, an option to list buckets/containers in natural (partial) order has been added. Listing containers in sorted order is canonical in both protocols, but is costly, and not required by some client applications. The performance and workload cost of S3 and Swift bucket/container listings is reduced for sharded buckets/containers when the `allow_unordered` extension is used. (BZ#1595374)\n\n* An asynchronous mechanism for executing the Ceph Object Gateway garbage collection using the `librados` APIs has been introduced. The original garbage collection mechanism serialized all processing, and lagged behind applications in specific workloads. Garbage collection performance has been significantly improved, and can be tuned to specific site requirements. (BZ#1595383)\n\nBug Fix(es):\n\nThese updated Ceph packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage 2.5 Release Notes for information on the most significant bug fixes for this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2018:2274",
        "url": "https://access.redhat.com/errata/RHSA-2018:2274"
      },
      {
        "category": "external",
        "summary": "https://rhcs.download.redhat.com/ubuntu",
        "url": "https://rhcs.download.redhat.com/ubuntu"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes",
        "url": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes"
      },
      {
        "category": "external",
        "summary": "1575866",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575866"
      },
      {
        "category": "external",
        "summary": "1576057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576057"
      },
      {
        "category": "external",
        "summary": "1593308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593308"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2274.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-15T00:34:49+00:00",
      "generator": {
        "date": "2024-11-15T00:34:49+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2018:2274",
      "initial_release_date": "2018-07-26T15:35:56+00:00",
      "revision_history": [
        {
          "date": "2018-07-26T15:35:56+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2018-07-26T15:35:56+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-15T00:34:49+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Ceph Storage 2 for Ubuntu",
                "product": {
                  "name": "Red Hat Ceph Storage 2 for Ubuntu",
                  "product_id": "Red Hat Ceph Storage 2 for Ubuntu",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:ceph_storage:2::ubuntu16.04"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Ceph Storage"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2018-1128",
      "cwe": {
        "id": "CWE-294",
        "name": "Authentication Bypass by Capture-replay"
      },
      "discovery_date": "2018-05-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1575866"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to the ceph cluster network who is also able to sniff packets on the network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "ceph: cephx protocol is vulnerable to replay attack",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat OpenStack Platform ships the flawed package, however RHOSP deployments use the ceph package directly from the Ceph channel.  A RHOSP ceph update will therefore not be provided at this time, but please ensure that the underlying Red Hat Ceph Storage is updated.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Ceph Storage 2 for Ubuntu"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-1128"
        },
        {
          "category": "external",
          "summary": "RHBZ#1575866",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575866"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1128",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-1128"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1128",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1128"
        }
      ],
      "release_date": "2018-07-09T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-07-26T15:35:56+00:00",
          "details": "The References section of this erratum contains a download link. You must\nlog in to download the update.\n\nRefer to the Red Hat Ceph Storage 2 Installation Guide for more information:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html-single/installation_guide_for_ubuntu/#enabling_the_red_hat_ceph_storage_repositories",
          "product_ids": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "ceph: cephx protocol is vulnerable to replay attack"
    },
    {
      "cve": "CVE-2018-1129",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "discovery_date": "2018-05-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1576057"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network, who is able to alter the message payload, was able to bypass signature checks done by cephx protocol.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "ceph: cephx uses weak signatures",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Ceph Storage 2 for Ubuntu"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-1129"
        },
        {
          "category": "external",
          "summary": "RHBZ#1576057",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576057"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1129",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-1129"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1129",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1129"
        }
      ],
      "release_date": "2018-07-09T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-07-26T15:35:56+00:00",
          "details": "The References section of this erratum contains a download link. You must\nlog in to download the update.\n\nRefer to the Red Hat Ceph Storage 2 Installation Guide for more information:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html-single/installation_guide_for_ubuntu/#enabling_the_red_hat_ceph_storage_repositories",
          "product_ids": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "ceph: cephx uses weak signatures"
    },
    {
      "cve": "CVE-2018-10861",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "discovery_date": "2018-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1593308"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete and corrupt snapshot images",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "ceph: ceph-mon does not perform authorization on OSD pool ops",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat Ceph Storage 2 for Ubuntu"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10861"
        },
        {
          "category": "external",
          "summary": "RHBZ#1593308",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593308"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10861",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10861"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10861",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10861"
        }
      ],
      "release_date": "2018-07-09T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-07-26T15:35:56+00:00",
          "details": "The References section of this erratum contains a download link. You must\nlog in to download the update.\n\nRefer to the Red Hat Ceph Storage 2 Installation Guide for more information:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html-single/installation_guide_for_ubuntu/#enabling_the_red_hat_ceph_storage_repositories",
          "product_ids": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2274"
        },
        {
          "category": "workaround",
          "details": "Use  mon_allow_pool_delete = false in ceph.conf to disable deletion of pools\n\n\n~]$ for p in `rados lspools`\ndo\n   ceph osd pool set $p nodelete true\ndone\n\ncaveat: This mitigation does not protect against  attacker from corrupting snapshot images",
          "product_ids": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat Ceph Storage 2 for Ubuntu"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "ceph: ceph-mon does not perform authorization on OSD pool ops"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.