Executive Summary
Summary | |
---|---|
Title | ceph regression update |
Informations | |||
---|---|---|---|
Name | DSA-4339 | First vendor Publication | 2018-11-13 |
Vendor | Debian | Last vendor Modification | 2018-11-21 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.5 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The update for ceph issued as DSA-4339-1 caused a build regression for the i386 builds. Updated packages are now available to address this issue. For reference, the original advisory text follows. Multiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was susceptible to replay attacks and calculated signatures incorrectly, "ceph mon" did not validate capabilities for pool operations (resulting in potential corruption or deletion of snapshot images) and a format string vulnerability in libradosstriper could result in denial of service. For the stable distribution (stretch), this problem has been fixed in version 10.2.11-2. We recommend that you upgrade your ceph packages. For the detailed security status of ceph please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ceph |
Original Source
Url : http://www.debian.org/security/2018/dsa-4339 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
75 % | CWE-287 | Improper Authentication |
25 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing a security update. File : fedora_2018-327707371e.nasl - Type : ACT_GATHER_INFO |
2018-11-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4339.nasl - Type : ACT_GATHER_INFO |
2018-08-07 | Name : The remote Fedora host is missing a security update. File : fedora_2018-8738f5f4a7.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-11-22 00:19:23 |
|
2018-11-14 17:21:25 |
|
2018-11-14 00:18:07 |
|