#VU14329 Security restrictions bypass in Ceph - CVE-2018-10861
Published: August 10, 2018 / Updated: August 28, 2018
Ceph
Red Hat Inc.
Description
The vulnerability allows an adjacent authenticated attacker to bypass security restrictions on the target system.
The vulnerability exists in ceph branches master, mimic, luminous and jewel due to improper handling of user-supplied requests by ceph mon. An adjacent attacker with read access to ceph can delete, create ceph storage pools and corrupt snapshot images.