RHEL 7 : Red Hat Ceph Storage 2.5 (RHSA-2018:2261)

high Nessus Plugin ID 111364

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:2261 advisory.

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)

* ceph: cephx uses weak signatures (CVE-2018-1129)

* ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861)

For more details about the security issue(s), including the impact, a CVSS score and other related information refer to the CVE page(s) listed in the Reference section.

Enhancement(s):

* Ceph OSDs now logs when they shutdown due to disk operations timing out by default. (BZ#1568897)

* The `radosgw-admin orphans find` command can inadvertently remove data objects still in use, if followed by another operation, such as, a `rados rm` command. Users are now warned before attempting to produce lists of potentially orphaned objects. (BZ#1573656)

* The 'ceph-osdomap-tool' now has a 'compact' command to perform offline compaction on an OSD's 'omap' directory. (BZ#1574231)

* For S3 and Swift protocols, an option to list buckets/containers in natural (partial) order has been added. Listing containers in sorted order is canonical in both protocols, but is costly, and not required by some client applications. The performance and workload cost of S3 and Swift bucket/container listings is reduced for sharded buckets/containers when the `allow_unordered` extension is used. (BZ#1595374)

* An asynchronous mechanism for executing the Ceph Object Gateway garbage collection using the `librados` APIs has been introduced. The original garbage collection mechanism serialized all processing, and lagged behind applications in specific workloads. Garbage collection performance has been significantly improved, and can be tuned to specific site requirements. (BZ#1595383)

Bug Fix(es):

These updated ceph packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage 2.5 Release Notes for information on the most significant bug fixes for this release:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/errata/RHSA-2018:2261

https://bugzilla.redhat.com/show_bug.cgi?id=1593308

https://bugzilla.redhat.com/show_bug.cgi?id=1575866

https://bugzilla.redhat.com/show_bug.cgi?id=1576057

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?2db5806d

http://www.nessus.org/u?cd14822b

https://bugzilla.redhat.com/show_bug.cgi?id=1448084

https://bugzilla.redhat.com/show_bug.cgi?id=1515341

https://bugzilla.redhat.com/show_bug.cgi?id=1522881

https://bugzilla.redhat.com/show_bug.cgi?id=1548071

https://bugzilla.redhat.com/show_bug.cgi?id=1554963

https://bugzilla.redhat.com/show_bug.cgi?id=1563825

https://bugzilla.redhat.com/show_bug.cgi?id=1568897

https://bugzilla.redhat.com/show_bug.cgi?id=1574231

https://bugzilla.redhat.com/show_bug.cgi?id=1581579

https://bugzilla.redhat.com/show_bug.cgi?id=1584218

https://bugzilla.redhat.com/show_bug.cgi?id=1584763

https://bugzilla.redhat.com/show_bug.cgi?id=1584829

https://bugzilla.redhat.com/show_bug.cgi?id=1595374

https://bugzilla.redhat.com/show_bug.cgi?id=1595383

https://bugzilla.redhat.com/show_bug.cgi?id=1595386

https://bugzilla.redhat.com/show_bug.cgi?id=1599507

Plugin Details

Severity: High

ID: 111364

File Name: redhat-RHSA-2018-2261.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/27/2018

Updated: 9/2/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS Score Source: CVE-2018-10861

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:ceph-common, p-cpe:/a:redhat:enterprise_linux:ceph-radosgw, p-cpe:/a:redhat:enterprise_linux:ceph-selinux, p-cpe:/a:redhat:enterprise_linux:librados2, p-cpe:/a:redhat:enterprise_linux:librados2-devel, p-cpe:/a:redhat:enterprise_linux:librbd1, p-cpe:/a:redhat:enterprise_linux:librbd1-devel, p-cpe:/a:redhat:enterprise_linux:python-rados, p-cpe:/a:redhat:enterprise_linux:python-rbd, p-cpe:/a:redhat:enterprise_linux:ceph-ansible, p-cpe:/a:redhat:enterprise_linux:ceph-base, p-cpe:/a:redhat:enterprise_linux:ceph-fuse, p-cpe:/a:redhat:enterprise_linux:ceph-mds, p-cpe:/a:redhat:enterprise_linux:librgw2, p-cpe:/a:redhat:enterprise_linux:python-cephfs, p-cpe:/a:redhat:enterprise_linux:rbd-mirror, p-cpe:/a:redhat:enterprise_linux:ceph-mon, p-cpe:/a:redhat:enterprise_linux:ceph-osd, p-cpe:/a:redhat:enterprise_linux:ceph-test, p-cpe:/a:redhat:enterprise_linux:libcephfs1, p-cpe:/a:redhat:enterprise_linux:libcephfs1-devel, p-cpe:/a:redhat:enterprise_linux:librgw2-devel, p-cpe:/a:redhat:enterprise_linux:ceph

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 7/25/2018

Vulnerability Publication Date: 7/10/2018

Reference Information

CVE: CVE-2018-10861, CVE-2018-1128, CVE-2018-1129

CWE: 284, 285, 294

RHSA: 2018:2261