A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ceph ceph 12.2.7 |
||
ceph ceph 12.2.5 |
||
ceph ceph 12.2.0 |
||
ceph ceph 10.2.10 |
||
ceph ceph 10.2.3 |
||
ceph ceph 10.2.1 |
||
ceph ceph 12.2.4 |
||
ceph ceph 12.2.3 |
||
ceph ceph 12.2.2 |
||
ceph ceph 12.2.1 |
||
ceph ceph 13.2.1 |
||
ceph ceph 10.2.8 |
||
ceph ceph 10.2.7 |
||
ceph ceph 10.2.6 |
||
ceph ceph 10.2.5 |
||
ceph ceph 13.2.0 |
||
ceph ceph 12.2.6 |
||
ceph ceph 10.2.11 |
||
ceph ceph 10.2.9 |
||
ceph ceph 10.2.4 |
||
ceph ceph 10.2.2 |
||
ceph ceph 10.2.0 |
||
redhat ceph storage osd 3 |
||
redhat enterprise linux server 7.0 |
||
redhat ceph storage 3 |
||
redhat ceph storage mon 2 |
||
redhat ceph storage mon 3 |
||
redhat enterprise linux workstation 7.0 |
||
redhat ceph storage osd 2 |
||
redhat enterprise linux desktop 7.0 |
||
opensuse leap 15.0 |
||
debian debian linux 9.0 |