You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa ceph

Sigurnosni nedostaci programskog paketa ceph

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3452-1
October 11, 2017

ceph vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Ceph.

Software Description:
– ceph: distributed storage and file system

Details:

It was discovered that Ceph incorrectly handled the handle_command
function. A remote authenticated user could use this issue to cause Ceph to
crash, resulting in a denial of service. (CVE-2016-5009)

Rahul Aggarwal discovered that Ceph incorrectly handled the
authenticated-read ACL. A remote attacker could possibly use this issue to
list bucket contents via a URL. (CVE-2016-7031)

Diluga Salome discovered that Ceph incorrectly handled certain POST objects
with null conditions. A remote attacker could possibly use this issue to
cuase Ceph to crash, resulting in a denial of service. (CVE-2016-8626)

Yang Liu discovered that Ceph incorrectly handled invalid HTTP Origin
headers. A remote attacker could possibly use this issue to cuase Ceph to
crash, resulting in a denial of service. (CVE-2016-9579)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
ceph 0.80.11-0ubuntu1.14.04.3
ceph-common 0.80.11-0ubuntu1.14.04.3

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3452-1
CVE-2016-5009, CVE-2016-7031, CVE-2016-8626, CVE-2016-9579

Package Information:
https://launchpad.net/ubuntu/+source/ceph/0.80.11-0ubuntu1.14.04.3

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=9MT7
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-10-0087-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa OpenStack Glance

Otkriveni su sigurnosni nedostaci u programskom paketu OpenStack Glance za operacijski sustav Ubuntu 14.04 LTS. Otkriveni nedostaci potencijalnim napadačima omogućuju...

Close