SB2019082111 - Red Hat update for Red Hat Ceph Storage 3.3



SB2019082111 - Red Hat update for Red Hat Ceph Storage 3.3

Published: August 21, 2019 Updated: August 21, 2019

Security Bulletin ID SB2019082111
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2018-14662)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The vulnerability exists due to information exposure. A remote attacker read only permissions can steal dm-crypt encryption keys used in ceph disk encryption.


2) Memory corruption (CVE-ID: CVE-2018-16846)

The vulnerability allows a remote authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists in the RADOS Gateway (RGW) code base due to boundary error in the ListBucket max-keys function during bucket listing operations. A remote attacker with Ceph RGW user permissions can trigger memory corruption and perform a denial of service attack against object maps (OMAPs) holding bucket indexes.


3) Memory leak (CVE-ID: CVE-2018-16889)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due memory leak in improper sanitization of encryption keys in debug logging output for v4 authentication. A local attacker can trigger memory leak and gain access to plaintext encryption key information in log files.


Remediation

Install update from vendor's website.