Vulnerabilities > CVE-2018-10861 - Improper Authentication vulnerability in multiple products

047910
CVSS 8.1 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
NONE
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
ceph
redhat
opensuse
debian
CWE-287
nessus

Summary

A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Authentication Abuse
    An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. This attack may exploit assumptions made by the target's authentication procedures, such as assumptions regarding trust relationships or assumptions regarding the generation of secret values. This attack differs from Authentication Bypass attacks in that Authentication Abuse allows the attacker to be certified as a valid user through illegitimate means, while Authentication Bypass allows the user to access protected material without ever being certified as an authenticated user. This attack does not rely on prior sessions established by successfully authenticating users, as relied upon for the "Exploitation of Session Variables, Resource IDs and other Trusted Credentials" attack patterns.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Utilizing REST's Trust in the System Resource to Register Man in the Middle
    This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to place man in the middle once SSL is terminated. Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required. Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The attacker can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the attacker gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
  • Man in the Middle Attack
    This type of attack targets the communication between two components (typically client and server). The attacker places himself in the communication channel between the two components. Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first goes to the attacker, who has the opportunity to observe or alter it, and it is then passed on to the other component as if it was never intercepted. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for Man-in-the-Middle attacks yields an implicit lack of trust in communication or identify between two components.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2018-2193-1.NASL
    descriptionThis update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in
    last seen2020-06-01
    modified2020-06-02
    plugin id111548
    published2018-08-06
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111548
    titleSUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2193-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2018:2193-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(111548);
      script_version("1.4");
      script_cvs_date("Date: 2019/09/10 13:51:48");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
    
      script_name(english:"SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2193-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for ceph fixes the following issues :
    
      - Update to version 12.2.7-420-gc0ef85b854 :
    
        - https://ceph.com/releases/12-2-7-luminous-released/
    
      - luminous: osd: eternal stuck PG in 'unfound_recovery'
        (bsc#1094932)
    
      - bluestore: db.slow used when db is not full
        (bsc#1092874)
    
      - CVE-2018-10861: Ensure that ceph-mon does perform
        authorization on all OSD pool ops (bsc#1099162).
    
      - CVE-2018-1129: cephx signature check bypass
        (bsc#1096748).
    
      - CVE-2018-1128: cephx protocol was vulnerable to replay
        attack (bsc#1096748).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1092874"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1094932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://ceph.com/releases/12-2-7-luminous-released/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-10861/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1128/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1129/"
      );
      # https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?cb506ffa"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t
    patch SUSE-SLE-SDK-12-SP3-2018-1494=1
    
    SUSE Linux Enterprise Server 12-SP3:zypper in -t patch
    SUSE-SLE-SERVER-12-SP3-2018-1494=1
    
    SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch
    SUSE-SLE-DESKTOP-12-SP3-2018-1494=1
    
    SUSE CaaS Platform ALL :
    
    To install this update, use the SUSE CaaS Platform Velum dashboard. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way.
    
    SUSE CaaS Platform 3.0 :
    
    To install this update, use the SUSE CaaS Platform Velum dashboard. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/08/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + sp);
    if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-0586-1.NASL
    descriptionThis update for ceph version 13.2.4 fixes the following issues : Security issues fixed : CVE-2018-14662: Fixed an issue with LUKS
    last seen2020-06-01
    modified2020-06-02
    plugin id122809
    published2019-03-13
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122809
    titleSUSE SLED15 / SLES15 Security Update : ceph (SUSE-SU-2019:0586-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2019:0586-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(122809);
      script_version("1.3");
      script_cvs_date("Date: 2020/02/05");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129", "CVE-2018-14662", "CVE-2018-16846");
    
      script_name(english:"SUSE SLED15 / SLES15 Security Update : ceph (SUSE-SU-2019:0586-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for ceph version 13.2.4 fixes the following issues :
    
    Security issues fixed :
    
    CVE-2018-14662: Fixed an issue with LUKS 'config-key' safety
    (bsc#1111177)
    
    CVE-2018-10861: Fixed an authorization bypass on OSD pool ops in
    ceph-mon (bsc#1099162)
    
    CVE-2018-1128: Fixed signature check bypass in cephx (bsc#1096748)
    
    CVE-2018-1129: Fixed replay attack in cephx protocol (bsc#1096748)
    
    CVE-2018-16846: Enforced bounds on max-keys/max-uploads/max-parts in
    rgw
    
    Non-security issues fixed: ceph-volume Python 3 fixes (bsc#1114567)
    
    fix python3 module loading (bsc#1086613)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1084645"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1086613"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1101262"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1111177"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1114567"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-10861/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1128/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1129/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-14662/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-16846/"
      );
      # https://www.suse.com/support/update/announcement/2019/suse-su-20190586-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c3125034"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Module for Open Buildservice Development Tools
    15:zypper in -t patch
    SUSE-SLE-Module-Development-Tools-OBS-15-2019-586=1
    
    SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch
    SUSE-SLE-Module-Basesystem-15-2019-586=1"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-base-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mds");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mds-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mgr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mgr-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mon-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-osd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-osd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-radosgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-radosgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-resource-agents");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rados-objclass-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-mirror");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-mirror-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-nbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-nbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/03/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/13");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0", os_ver + " SP" + sp);
    if (os_ver == "SLED15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-base-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mds-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mgr-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mon-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-osd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-mirror-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-nbd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-common-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librados-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librados2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper1-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librbd-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librbd1-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librgw-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librgw2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-cephfs-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rados-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rbd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rgw-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLES15", sp:"0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-base-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mds-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mgr-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mon-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-osd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-mirror-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-nbd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-common-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librados-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librados2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper1-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librbd-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librbd1-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librgw-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librgw2-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-cephfs-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rados-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rbd-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rgw-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++;
    if (rpm_check(release:"SLED15", sp:"0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-3.7.2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2177.NASL
    descriptionAn update for ceph is now available for Red Hat Ceph Storage 3.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es) : * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Previously, Ceph RADOS Gateway (RGW) instances in zones configured for multi-site replication would crash if configured to disable sync (
    last seen2020-06-01
    modified2020-06-02
    plugin id111145
    published2018-07-18
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111145
    titleRHEL 7 : Red Hat Ceph Storage 3.0 (RHSA-2018:2177)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2018:2177. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(111145);
      script_version("1.6");
      script_cvs_date("Date: 2019/10/24 15:35:45");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
      script_xref(name:"RHSA", value:"2018:2177");
    
      script_name(english:"RHEL 7 : Red Hat Ceph Storage 3.0 (RHSA-2018:2177)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An update for ceph is now available for Red Hat Ceph Storage 3.0 for
    Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having a security
    impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
    score, which gives a detailed severity rating, is available for each
    vulnerability from the CVE link(s) in the References section.
    
    Red Hat Ceph Storage is a scalable, open, software-defined storage
    platform that combines the most stable version of the Ceph storage
    system with a Ceph management platform, deployment utilities, and
    support services.
    
    Security Fix(es) :
    
    * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)
    
    * ceph: cephx uses weak signatures (CVE-2018-1129)
    
    * ceph: ceph-mon does not perform authorization on OSD pool ops
    (CVE-2018-10861)
    
    For more details about the security issue(s), including the impact, a
    CVSS score, and other related information, refer to the CVE page(s)
    listed in the References section.
    
    Bug Fix(es) :
    
    * Previously, Ceph RADOS Gateway (RGW) instances in zones configured
    for multi-site replication would crash if configured to disable sync
    ('rgw_run_sync_thread = false'). Therefor, multi-site replication
    environments could not start dedicated non-replication RGW instances.
    With this update, the 'rgw_run_sync_thread' option can be used to
    configure RGW instances that will not participate in replication even
    if their zone is replicated. (BZ#1552202)
    
    * Previously, when increasing 'max_mds' from '1' to '2', if the
    Metadata Server (MDS) daemon was in the starting/resolve state for a
    long period of time, then restarting the MDS daemon lead to assert.
    This caused the Ceph File System (CephFS) to be in degraded state.
    With this update, increasing 'max_mds' no longer causes CephFS to be
    in degraded state. (BZ#1566016)
    
    * Previously, the transition to containerized Ceph left some
    'ceph-disk' unit files. The files were harmless, but appeared as
    failing. With this update, executing the
    'switch-from-non-containerized-to-containerized-ceph-daemons.yml'
    playbook disables the 'ceph-disk' unit files too. (BZ#1577846)
    
    * Previously, the 'entries_behind_master' metric output from the 'rbd
    mirror image status' CLI tool did not always reduce to zero under
    synthetic workloads. This could cause a false alarm that there is an
    issue with RBD mirroring replications. With this update, the metric is
    now updated periodically without the need for an explicit I/O flush in
    the workload. (BZ#1578509)
    
    * Previously, when using the 'pool create' command with
    'expected_num_objects', placement group (PG) directories were not
    pre-created at pool creation time as expected, resulting in
    performance drops when filestore splitting occurred. With this update,
    the 'expected_num_objects' parameter is now passed through to
    filestore correctly, and PG directories for the expected number of
    objects are pre-created at pool creation time. (BZ#1579039)
    
    * Previously, internal RADOS Gateway (RGW) multi-site sync logic
    behaved incorrectly when attempting to sync containers with S3 object
    versioning enabled. Objects in versioning-enabled containers would
    fail to sync in some scenarios--for example, when using 's3cmd sync'
    to mirror a filesystem directory. With this update, RGW multi-site
    replication logic has been corrected for the known failure cases.
    (BZ#1580497)
    
    * When restarting OSD daemons, the 'ceph-ansible' restart script goes
    through all the daemons by listing the units with systemctl
    list-units. Under certain circumstances, the output of the command
    contains extra spaces, which caused parsing and restart to fail. With
    this update, the underlying code has been changed to handle the extra
    space.
    
    * Previously, the Ceph RADOS Gateway (RGW) server treated negative
    byte-range object requests ('bytes=0--1') as invalid. Applications
    that expect the AWS behavior for negative or other invalid range
    requests saw unexpected errors and could fail. With this update, a new
    option 'rgw_ignore_get_invalid_range' has been added to RGW. When
    'rgw_ignore_get_invalid_range' is set to 'true', the RGW behavior for
    invalid range requests is backwards compatible with AWS."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2018:2177"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-1128"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-1129"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2018-10861"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-ansible");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-mds");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-radosgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-selinux");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-ansible");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-collectors");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-grafana-plugins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libcephfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librados-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librbd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librgw-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-ceph");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:rbd-mirror");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/07/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2018:2177";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
    
      if (! (rpm_exists(release:"RHEL7", rpm:"librados2-12.*\.el7cp"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Ceph Storage");
    
      if (rpm_check(release:"RHEL7", reference:"ceph-ansible-3.0.39-1.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-base-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-common-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-debuginfo-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-fuse-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-mds-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-radosgw-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-selinux-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-1.0.1-1.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-ansible-1.0.1-1.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-collectors-1.0.1-1.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-grafana-plugins-1.0.1-1.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libcephfs-devel-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libcephfs2-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librados-devel-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librados2-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libradosstriper1-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librbd-devel-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librbd1-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librgw-devel-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librgw2-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-2.5.5-6.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-ceph-2.5.5-6.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-debuginfo-2.5.5-6.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-rgw-2.5.5-6.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-cephfs-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rados-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rbd-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rgw-12.2.4-30.el7cp")) flag++;
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"rbd-mirror-12.2.4-30.el7cp")) flag++;
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-ansible / ceph-base / ceph-common / ceph-debuginfo / ceph-fuse / etc");
      }
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-8738F5F4A7.NASL
    descriptionNew release (1:12.2.7-1) ---- New release (1:12.2.6-1) CVE-2018-1128 CVE-2018-1129 CVE-2018-10861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-08-07
    plugin id111559
    published2018-08-07
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111559
    titleFedora 27 : 1:ceph (2018-8738f5f4a7)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory FEDORA-2018-8738f5f4a7.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(111559);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
      script_xref(name:"FEDORA", value:"2018-8738f5f4a7");
    
      script_name(english:"Fedora 27 : 1:ceph (2018-8738f5f4a7)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "New release (1:12.2.7-1)
    
    ----
    
    New release (1:12.2.6-1) CVE-2018-1128 CVE-2018-1129 CVE-2018-10861
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora update system website.
    Tenable has attempted to automatically clean and format it as much as
    possible without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-8738f5f4a7"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected 1:ceph package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:1:ceph");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:27");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/08/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! preg(pattern:"^27([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 27", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"FC27", reference:"ceph-12.2.7-1.fc27", epoch:"1")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "1:ceph");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2018-854.NASL
    descriptionThis update for ceph fixes the following issues : Security issues fixed : - CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162) - CVE-2018-1129: cephx signature check bypass (bsc#1096748) - CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748) Bugs fixed in 12.2.7-420-gc0ef85b854 : - luminous: osd: eternal stuck PG in
    last seen2020-06-05
    modified2018-08-10
    plugin id111635
    published2018-08-10
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111635
    titleopenSUSE Security Update : ceph (openSUSE-2018-854)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2018-854.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(111635);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
    
      script_name(english:"openSUSE Security Update : ceph (openSUSE-2018-854)");
      script_summary(english:"Check for the openSUSE-2018-854 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for ceph fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2018-10861: Ensure that ceph-mon does perform
        authorization on all OSD pool ops (bsc#1099162)
    
      - CVE-2018-1129: cephx signature check bypass
        (bsc#1096748)
    
      - CVE-2018-1128: cephx protocol was vulnerable to replay
        attack (bsc#1096748)
    
    Bugs fixed in 12.2.7-420-gc0ef85b854 :
    
      - luminous: osd: eternal stuck PG in 'unfound_recovery'
        (bsc#1094932)
    
      - bluestore: db.slow used when db is not full
        (bsc#1092874)
    
      - Upstream fixes and improvements, see
        https://ceph.com/releases/12-2-7-luminous-released/ This
        update was imported from the SUSE:SLE-12-SP3:Update
        update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1092874"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1094932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096748"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099162"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://ceph.com/releases/12-2-7-luminous-released/"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected ceph packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-resource-agents");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-ceph-compat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-ceph-argparse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rados-objclass-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/08/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-base-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-base-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-fuse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-fuse-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mds-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mds-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mgr-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mgr-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mon-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-mon-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-osd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-osd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-radosgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-radosgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-resource-agents-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-debugsource-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libcephfs-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librados-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librados-devel-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librbd-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librgw-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-ceph-compat-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-ceph-argparse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-cephfs-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rados-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"python3-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rados-objclass-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-fuse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-fuse-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-mirror-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-mirror-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-nbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    if ( rpm_check(release:"SUSE42.3", reference:"rbd-nbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-test / ceph-test-debuginfo / ceph-test-debugsource / ceph / etc");
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4339.NASL
    descriptionMultiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was suspectible to replay attacks and calculated signatures incorrectly,
    last seen2020-06-01
    modified2020-06-02
    plugin id118939
    published2018-11-14
    reporterThis script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/118939
    titleDebian DSA-4339-1 : ceph - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-4339. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(118939);
      script_version("1.1");
      script_cvs_date("Date: 2018/11/14 14:36:20");
    
      script_cve_id("CVE-2017-7519", "CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
      script_xref(name:"DSA", value:"4339");
    
      script_name(english:"Debian DSA-4339-1 : ceph - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple vulnerabilities were discovered in Ceph, a distributed
    storage and file system: The cephx authentication protocol was
    suspectible to replay attacks and calculated signatures incorrectly,
    'ceph mon' did not validate capabilities for pool operations
    (resulting in potential corruption or deletion of snapshot images) and
    a format string vulnerability in libradosstriper could result in
    denial of service."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/source-package/ceph"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/stretch/ceph"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2018/dsa-4339"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the ceph packages.
    
    For the stable distribution (stretch), these problems have been fixed
    in version 10.2.11-1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ceph");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2018/11/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/11/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"9.0", prefix:"ceph", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-base", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-common", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-fs-common", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-fuse", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-mds", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-mon", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-osd", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-resource-agents", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"ceph-test", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libcephfs-dev", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libcephfs-java", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libcephfs-jni", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libcephfs1", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librados-dev", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librados2", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libradosstriper-dev", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"libradosstriper1", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librbd-dev", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librbd1", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librgw-dev", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"librgw2", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"python-ceph", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"python-cephfs", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"python-rados", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"python-rbd", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"radosgw", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"rbd-fuse", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"rbd-mirror", reference:"10.2.11-1")) flag++;
    if (deb_check(release:"9.0", prefix:"rbd-nbd", reference:"10.2.11-1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1284.NASL
    descriptionThis update for ceph version 13.2.4 fixes the following issues : Security issues fixed : - CVE-2018-14662: Fixed an issue with LUKS
    last seen2020-06-01
    modified2020-06-02
    plugin id124358
    published2019-04-29
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124358
    titleopenSUSE Security Update : ceph (openSUSE-2019-1284)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2019-1284.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(124358);
      script_version("1.2");
      script_cvs_date("Date: 2020/01/21");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129", "CVE-2018-14662", "CVE-2018-16846");
    
      script_name(english:"openSUSE Security Update : ceph (openSUSE-2019-1284)");
      script_summary(english:"Check for the openSUSE-2019-1284 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for ceph version 13.2.4 fixes the following issues :
    
    Security issues fixed :
    
      - CVE-2018-14662: Fixed an issue with LUKS 'config-key'
        safety (bsc#1111177)
    
      - CVE-2018-10861: Fixed an authorization bypass on OSD
        pool ops in ceph-mon (bsc#1099162)
    
      - CVE-2018-1128: Fixed signature check bypass in cephx
        (bsc#1096748)
    
      - CVE-2018-1129: Fixed replay attack in cephx protocol
        (bsc#1096748)
    
      - CVE-2018-16846: Enforced bounds on
        max-keys/max-uploads/max-parts in rgw (bsc#1114710)
    
    Non-security issues fixed :
    
      - ceph-volume Python 3 fixes (bsc#1114567)
    
      - Fixed python3 module loading (bsc#1086613)
    
      - Fixed an issue where ceph build fails (bsc#1084645)
    
      - ceph's SPDK builds with march=native (bsc#1101262)
    
    This update was imported from the SUSE:SLE-15:Update update project."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1084645"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086613"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096748"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099162"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101262"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1111177"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1114567"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1114710"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected ceph packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-resource-agents");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rados-objclass-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/04/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/29");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-base-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-common-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-fuse-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mds-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mgr-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mon-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-osd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-debugsource-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libcephfs2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librados-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librados2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper1-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librbd-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librbd1-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librgw-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librgw2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-cephfs-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rados-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rbd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rgw-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-fuse-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-mirror-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-nbd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    if ( rpm_check(release:"SUSE15.0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-test / ceph-test-debuginfo / ceph-test-debugsource / ceph / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2018-2478-1.NASL
    descriptionThis update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in
    last seen2020-06-01
    modified2020-06-02
    plugin id112079
    published2018-08-23
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/112079
    titleSUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2478-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2018:2478-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(112079);
      script_version("1.4");
      script_cvs_date("Date: 2019/09/10 13:51:48");
    
      script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129");
    
      script_name(english:"SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2478-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update for ceph fixes the following issues :
    
      - Update to version 12.2.7-420-gc0ef85b854 :
    
        - https://ceph.com/releases/12-2-7-luminous-released/
    
      - luminous: osd: eternal stuck PG in 'unfound_recovery'
        (bsc#1094932)
    
      - bluestore: db.slow used when db is not full
        (bsc#1092874)
    
      - CVE-2018-10861: Ensure that ceph-mon does perform
        authorization on all OSD pool ops (bsc#1099162).
    
      - CVE-2018-1129: cephx signature check bypass
        (bsc#1096748).
    
      - CVE-2018-1128: cephx protocol was vulnerable to replay
        attack (bsc#1096748).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1092874"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1094932"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://ceph.com/releases/12-2-7-luminous-released/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-10861/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1128/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.suse.com/security/cve/CVE-2018-1129/"
      );
      # https://www.suse.com/support/update/announcement/2018/suse-su-20182478-1/
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?454e1918"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use the SUSE recommended
    installation methods like YaST online_update or 'zypper patch'.
    
    Alternatively you can run the command listed for your product :
    
    SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t
    patch SUSE-SLE-SDK-12-SP3-2018-1494=1
    
    SUSE Linux Enterprise Server 12-SP3:zypper in -t patch
    SUSE-SLE-SERVER-12-SP3-2018-1494=1
    
    SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch
    SUSE-SLE-DESKTOP-12-SP3-2018-1494=1
    
    SUSE CaaS Platform ALL :
    
    To install this update, use the SUSE CaaS Platform Velum dashboard. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way.
    
    SUSE CaaS Platform 3.0 :
    
    To install this update, use the SUSE CaaS Platform Velum dashboard. It
    will inform you if it detects new updates and let you then trigger
    updating of the complete cluster in a controlled way."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/08/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/23");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + sp);
    if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph");
    }
    
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-2_0-0104_CEPH.NASL
    descriptionAn update of the ceph package has been released.
    last seen2020-03-17
    modified2019-02-07
    plugin id121999
    published2019-02-07
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121999
    titlePhoton OS 2.0: Ceph PHSA-2018-2.0-0104
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-327707371E.NASL
    descriptionNew release (1:12.2.6-1) Security fix for CVE-2018-1128 Security fix for CVE-2018-1129 Security fix for CVE-2018-10861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2019-01-03
    plugin id120338
    published2019-01-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/120338
    titleFedora 28 : 1:ceph (2018-327707371e)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2018-2261.NASL
    descriptionAn update for ceph is now available for Red Hat Ceph Storage 2.5 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es) : * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score and other related information refer to the CVE page(s) listed in the Reference section. Enhancement(s) : * Ceph OSDs now logs when they shutdown due to disk operations timing out by default. (BZ#1568897) * The `radosgw-admin orphans find` command can inadvertently remove data objects still in use, if followed by another operation, such as, a `rados rm` command. Users are now warned before attempting to produce lists of potentially orphaned objects. (BZ#1573656) * The
    last seen2020-06-01
    modified2020-06-02
    plugin id111364
    published2018-07-27
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/111364
    titleRHEL 7 : Red Hat Ceph Storage 2.5 (RHSA-2018:2261)

Redhat

advisories
  • rhsa
    idRHSA-2018:2177
  • rhsa
    idRHSA-2018:2179
  • rhsa
    idRHSA-2018:2261
  • rhsa
    idRHSA-2018:2274
rpms
  • ceph-ansible-0:3.0.39-1.el7cp
  • ceph-base-2:12.2.4-30.el7cp
  • ceph-common-2:12.2.4-30.el7cp
  • ceph-debuginfo-2:12.2.4-30.el7cp
  • ceph-fuse-2:12.2.4-30.el7cp
  • ceph-mds-2:12.2.4-30.el7cp
  • ceph-mgr-2:12.2.4-30.el7cp
  • ceph-mon-2:12.2.4-30.el7cp
  • ceph-osd-2:12.2.4-30.el7cp
  • ceph-radosgw-2:12.2.4-30.el7cp
  • ceph-selinux-2:12.2.4-30.el7cp
  • ceph-test-2:12.2.4-30.el7cp
  • cephmetrics-0:1.0.1-1.el7cp
  • cephmetrics-ansible-0:1.0.1-1.el7cp
  • cephmetrics-collectors-0:1.0.1-1.el7cp
  • cephmetrics-grafana-plugins-0:1.0.1-1.el7cp
  • libcephfs-devel-2:12.2.4-30.el7cp
  • libcephfs2-2:12.2.4-30.el7cp
  • librados-devel-2:12.2.4-30.el7cp
  • librados2-2:12.2.4-30.el7cp
  • libradosstriper1-2:12.2.4-30.el7cp
  • librbd-devel-2:12.2.4-30.el7cp
  • librbd1-2:12.2.4-30.el7cp
  • librgw-devel-2:12.2.4-30.el7cp
  • librgw2-2:12.2.4-30.el7cp
  • nfs-ganesha-0:2.5.5-6.el7cp
  • nfs-ganesha-ceph-0:2.5.5-6.el7cp
  • nfs-ganesha-debuginfo-0:2.5.5-6.el7cp
  • nfs-ganesha-rgw-0:2.5.5-6.el7cp
  • python-cephfs-2:12.2.4-30.el7cp
  • python-rados-2:12.2.4-30.el7cp
  • python-rbd-2:12.2.4-30.el7cp
  • python-rgw-2:12.2.4-30.el7cp
  • rbd-mirror-2:12.2.4-30.el7cp
  • ceph-ansible-0:3.0.39-1.el7cp
  • ceph-base-2:10.2.10-28.el7cp
  • ceph-common-2:10.2.10-28.el7cp
  • ceph-debuginfo-2:10.2.10-28.el7cp
  • ceph-fuse-2:10.2.10-28.el7cp
  • ceph-mds-2:10.2.10-28.el7cp
  • ceph-mon-2:10.2.10-28.el7cp
  • ceph-osd-2:10.2.10-28.el7cp
  • ceph-radosgw-2:10.2.10-28.el7cp
  • ceph-selinux-2:10.2.10-28.el7cp
  • ceph-test-2:10.2.10-28.el7cp
  • libcephfs1-2:10.2.10-28.el7cp
  • libcephfs1-devel-2:10.2.10-28.el7cp
  • librados2-2:10.2.10-28.el7cp
  • librados2-devel-2:10.2.10-28.el7cp
  • librbd1-2:10.2.10-28.el7cp
  • librbd1-devel-2:10.2.10-28.el7cp
  • librgw2-2:10.2.10-28.el7cp
  • librgw2-devel-2:10.2.10-28.el7cp
  • python-cephfs-2:10.2.10-28.el7cp
  • python-rados-2:10.2.10-28.el7cp
  • python-rbd-2:10.2.10-28.el7cp
  • rbd-mirror-2:10.2.10-28.el7cp