A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete and corrupt snapshot images
Find out more about CVE-2018-10861 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 4.6 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
Attack Vector | Adjacent Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | Low |
Platform | Errata | Release Date |
---|---|---|
Red Hat Ceph Storage 3 for Ubuntu | RHSA-2018:2179 | 2018-07-11 |
Red Hat Enterprise Linux 7 | RHSA-2018:2261 | 2018-07-26 |
Red Hat Ceph Storage 3 for Red Hat Enterprise Linux 7 | RHSA-2018:2177 | 2018-07-11 |
Red Hat Ceph Storage 2 for Ubuntu | RHSA-2018:2274 | 2018-07-26 |
Red Hat Ceph Storage Tools 2 | RHSA-2018:2261 | 2018-07-26 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | ceph-common | Not affected |
Use mon_allow_pool_delete = false in ceph.conf to disable deletion of pools
~]$ for p in `rados lspools`
do
ceph osd pool set $p nodelete true
done
caveat: This mitigation does not protect against attacker from corrupting snapshot images