Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2016-8626: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2016-8626: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
11/22/2016
Created
07/25/2018
Added
05/22/2017
Modified
10/10/2018

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From RHSA-2016:2815:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

The following packages have been upgraded to a newer upstream version: ceph (10.2.3), ceph-deploy (1.5.36), calamari-server (1.4.9), nfs-ganesha (2.4.0), ceph-iscsi-config (1.5), libntirpc (1.4.1), ceph-iscsi-tools (1.1). (BZ#1340004, BZ#1349999)

Security Fix(es):

A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests. (CVE-2016-8626)

Bug Fix(es) and Enhancement(s):

For detailed information on changes in this release, see the Red Hat Ceph Storage 2.1 Release Notes available at:

https://access.redhat.com/documentation/en/red-hat-ceph-storage/2.1/single/release-notes/

All users of Red Hat Ceph Storage are advised to upgrade to these updated packages.

From RHSA-2016:2847:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

Security Fix(es):

A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests. (CVE-2016-8626)

Bug Fix(es):

Dynamic Large Objects (DLOs) containing zero-length segments could cause the GET requests to enter an infinite loop or to fail depending on the position of the zero-length segment in an object, causing Ceph Object Gateway nodes to consume 100% of CPU. This bug has been fixed, and the GET requests succeed as expected in described situation. (BZ#1380196)After backporting certain upstream changes, an attempt to delete objects that contain underscore characters failed. The change causing this bug has been removed, and objects can now be deleted as expected. (BZ#1388647)

Enhancement(s):

This update adds the "apply-layout-settings" command to the ceph-objectstore-tool utility. The new command enables users to perform collection splitting offline on OSD nodes in cases when doing it online would cause too large an impact. (BZ#1367441)With this update, it is possible to change the maximum number shards per bucket. This is especially useful when bucket sharding was not configured correctly. (BZ#1378995)

All users of Red Hat Ceph Storage are advised to upgrade to these updated packages.

From SUSE_CVE-2016-8626:

This CVE is addressed in the SUSE advisories SUSE-SU-2017:0758-1.

Solution(s)

  • suse-upgrade-ceph
  • suse-upgrade-ceph-common
  • suse-upgrade-ceph-common-debuginfo
  • suse-upgrade-ceph-debuginfo
  • suse-upgrade-ceph-debugsource
  • suse-upgrade-ceph-devel-compat
  • suse-upgrade-libcephfs1
  • suse-upgrade-libcephfs1-debuginfo
  • suse-upgrade-libcephfs1-devel
  • suse-upgrade-librados2
  • suse-upgrade-librados2-debuginfo
  • suse-upgrade-librados2-devel
  • suse-upgrade-libradosstriper1
  • suse-upgrade-libradosstriper1-debuginfo
  • suse-upgrade-libradosstriper1-devel
  • suse-upgrade-librbd1
  • suse-upgrade-librbd1-debuginfo
  • suse-upgrade-librbd1-devel
  • suse-upgrade-python-ceph-compat
  • suse-upgrade-python-cephfs
  • suse-upgrade-python-rados
  • suse-upgrade-python-rbd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;