Debian DSA-4339-1 : ceph - security update

high Nessus Plugin ID 118939

Synopsis

The remote Debian host is missing a security-related update.

Description

Multiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was suspectible to replay attacks and calculated signatures incorrectly, 'ceph mon' did not validate capabilities for pool operations (resulting in potential corruption or deletion of snapshot images) and a format string vulnerability in libradosstriper could result in denial of service.

Solution

Upgrade the ceph packages.

For the stable distribution (stretch), these problems have been fixed in version 10.2.11-1.

See Also

https://security-tracker.debian.org/tracker/source-package/ceph

https://packages.debian.org/source/stretch/ceph

https://www.debian.org/security/2018/dsa-4339

Plugin Details

Severity: High

ID: 118939

File Name: debian_DSA-4339.nasl

Version: 1.3

Type: local

Agent: unix

Published: 11/14/2018

Updated: 7/22/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS Score Source: CVE-2018-10861

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:ceph

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/13/2018

Vulnerability Publication Date: 7/10/2018

Reference Information

CVE: CVE-2017-7519, CVE-2018-10861, CVE-2018-1128, CVE-2018-1129

DSA: 4339