SB2019030809 - OpenSUSE Linux update for ceph
Published: March 8, 2019 Updated: April 26, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2018-14662)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to information exposure. A remote attacker read only permissions can steal dm-crypt encryption keys used in ceph disk encryption.
2) Memory corruption (CVE-ID: CVE-2018-16846)
The vulnerability allows a remote authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the RADOS Gateway (RGW) code base due to boundary error in the ListBucket max-keys function during bucket listing operations. A remote attacker with Ceph RGW user permissions can trigger memory corruption and perform a denial of service attack against object maps (OMAPs) holding bucket indexes.
3) Memory leak (CVE-ID: CVE-2018-16889)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due memory leak in improper sanitization of encryption keys in debug logging output for v4 authentication. A local attacker can trigger memory leak and gain access to plaintext encryption key information in log files.
Remediation
Install update from vendor's website.