vulnerability

Red Hat: CVE-2018-10861: Moderate: Red Hat Ceph Storage 3.0 security and bug fix update (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:P)
Published
Jul 10, 2018
Added
Jul 27, 2018
Modified
Jan 30, 2023

Description

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.

Solution(s)

redhat-upgrade-ceph-ansibleredhat-upgrade-ceph-baseredhat-upgrade-ceph-commonredhat-upgrade-ceph-debuginforedhat-upgrade-ceph-fuseredhat-upgrade-ceph-mdsredhat-upgrade-ceph-radosgwredhat-upgrade-ceph-selinuxredhat-upgrade-cephmetricsredhat-upgrade-cephmetrics-ansibleredhat-upgrade-cephmetrics-collectorsredhat-upgrade-cephmetrics-grafana-pluginsredhat-upgrade-libcephfs-develredhat-upgrade-libcephfs1redhat-upgrade-libcephfs1-develredhat-upgrade-libcephfs2redhat-upgrade-librados-develredhat-upgrade-libradosstriper1redhat-upgrade-librbd-develredhat-upgrade-librgw-develredhat-upgrade-librgw2redhat-upgrade-librgw2-develredhat-upgrade-nfs-ganesharedhat-upgrade-nfs-ganesha-cephredhat-upgrade-nfs-ganesha-debuginforedhat-upgrade-nfs-ganesha-rgwredhat-upgrade-python-cephfsredhat-upgrade-python-rgwredhat-upgrade-rbd-mirror
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.