Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Ceph
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Ceph
ID: USN-4035-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.10, Ubuntu 19.04
Datum: Di, 25. Juni 2019, 23:14
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846
Applikationen: Ceph

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============5095111635813123714==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="1rVwzcKvIUrvPBOQ8Mu7K7cj5phhCxX1e"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--1rVwzcKvIUrvPBOQ8Mu7K7cj5phhCxX1e
Content-Type: multipart/mixed;
boundary="B9qhq46mFOATv8ZRwQGqETemLxyh1O1On";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: "ubuntu-security-announce@lists.ubuntu.com"
<ubuntu-security-announce@lists.ubuntu.com>
Message-ID: <b5a0914d-cd7d-d74e-0992-a7e703c6ae0b@canonical.com>
Subject: [USN-4035-1] Ceph vulnerabilities

--B9qhq46mFOATv8ZRwQGqETemLxyh1O1On
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-4035-1
June 25, 2019

ceph vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Ceph.

Software Description:
- ceph: distributed storage and file system

Details:

It was discovered that Ceph incorrectly handled read only permissions. An
authenticated attacker could use this issue to obtain dm-crypt encryption
keys. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-14662)

It was discovered that Ceph incorrectly handled certain OMAPs holding
bucket indices. An authenticated attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 16.04 LTS.
(CVE-2018-16846)

It was discovered that Ceph incorrectly sanitized certain debug logs. A
local attacker could possibly use this issue to obtain encryption key
information. This issue was only addressed in Ubuntu 18.10 and Ubuntu
19.04. (CVE-2018-16889)

It was discovered that Ceph incorrectly handled certain civetweb requests.
A remote attacker could possibly use this issue to consume resources,
leading to a denial of service. This issue only affected Ubuntu 18.10 and
Ubuntu 19.04. (CVE-2019-3821)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
ceph 13.2.4+dfsg1-0ubuntu2.1
ceph-common 13.2.4+dfsg1-0ubuntu2.1

Ubuntu 18.10:
ceph 13.2.4+dfsg1-0ubuntu0.18.10.2
ceph-common 13.2.4+dfsg1-0ubuntu0.18.10.2

Ubuntu 16.04 LTS:
ceph 10.2.11-0ubuntu0.16.04.2
ceph-common 10.2.11-0ubuntu0.16.04.2

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4035-1
CVE-2018-14662, CVE-2018-16846, CVE-2018-16889, CVE-2019-3821

Package Information:
https://launchpad.net/ubuntu/+source/ceph/13.2.4+dfsg1-0ubuntu2.1
https://launchpad.net/ubuntu/+source/ceph/13.2.4+dfsg1-0ubuntu0.18.10.2
https://launchpad.net/ubuntu/+source/ceph/10.2.11-0ubuntu0.16.04.2


--B9qhq46mFOATv8ZRwQGqETemLxyh1O1On--

--1rVwzcKvIUrvPBOQ8Mu7K7cj5phhCxX1e
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=voua
-----END PGP SIGNATURE-----

--1rVwzcKvIUrvPBOQ8Mu7K7cj5phhCxX1e--


--===============5095111635813123714==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============5095111635813123714==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung