| Title | ceph における認証に関する脆弱性 |
|---|---|
| Summary | ceph には、認証に関する脆弱性が存在します。 |
| Possible impacts | 情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | July 9, 2018, midnight |
| Registration Date | Sept. 28, 2018, 12:30 p.m. |
| Last Update | Sept. 28, 2018, 12:30 p.m. |
| CVSS3.0 : 重要 | |
| Score | 8.1 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
| CVSS2.0 : 警告 | |
| Score | 5.5 |
|---|---|
| Vector | AV:N/AC:L/Au:S/C:N/I:P/A:P |
| レッドハット |
| Red Hat Ceph Storage |
| Red Hat Ceph Storage MON |
| Red Hat Ceph Storage OSD |
| Red Hat Enterprise Linux |
| Red Hat Enterprise Linux Desktop |
| Red Hat Enterprise Linux Server |
| Red Hat Enterprise Linux Workstation |
| Ceph project |
| Ceph |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年09月28日] 掲載 |
Sept. 28, 2018, 12:30 p.m. |
| Summary | A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected. |
|---|---|
| Publication Date | July 10, 2018, 11:29 p.m. |
| Registration Date | March 1, 2021, 6:43 p.m. |
| Last Update | Nov. 21, 2024, 12:42 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |||||