Description
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-2928 | A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected. |
References
History
No history.
Subscriptions
Ceph
Subscribe
Ceph
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Ceph Storage
Subscribe
Ceph Storage Mon
Subscribe
Ceph Storage Osd
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T16:28:46.914Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10861
No data.
Status : Modified
Published: 2018-07-10T14:29:00.213
Modified: 2024-11-21T03:42:09.890
Link: CVE-2018-10861
OpenCVE Enrichment
No data.
EUVD