Vulnerabilities > CVE-2018-10861 - Improper Authentication vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
HIGH Availability impact
HIGH Summary
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | Ceph
| 22 |
Application | 5 | |
OS | 3 | |
OS | 1 | |
OS | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Authentication Abuse An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. This attack may exploit assumptions made by the target's authentication procedures, such as assumptions regarding trust relationships or assumptions regarding the generation of secret values. This attack differs from Authentication Bypass attacks in that Authentication Abuse allows the attacker to be certified as a valid user through illegitimate means, while Authentication Bypass allows the user to access protected material without ever being certified as an authenticated user. This attack does not rely on prior sessions established by successfully authenticating users, as relied upon for the "Exploitation of Session Variables, Resource IDs and other Trusted Credentials" attack patterns.
- Exploiting Trust in Client (aka Make the Client Invisible) An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
- Utilizing REST's Trust in the System Resource to Register Man in the Middle This attack utilizes a REST(REpresentational State Transfer)-style applications' trust in the system resources and environment to place man in the middle once SSL is terminated. Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required. Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The attacker can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the attacker gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
- Man in the Middle Attack This type of attack targets the communication between two components (typically client and server). The attacker places himself in the communication channel between the two components. Whenever one component attempts to communicate with the other (data flow, authentication challenges, etc.), the data first goes to the attacker, who has the opportunity to observe or alter it, and it is then passed on to the other component as if it was never intercepted. This interposition is transparent leaving the two compromised components unaware of the potential corruption or leakage of their communications. The potential for Man-in-the-Middle attacks yields an implicit lack of trust in communication or identify between two components.
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2193-1.NASL description This update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in last seen 2020-06-01 modified 2020-06-02 plugin id 111548 published 2018-08-06 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111548 title SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2193-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2018:2193-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(111548); script_version("1.4"); script_cvs_date("Date: 2019/09/10 13:51:48"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_name(english:"SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2193-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932) - bluestore: db.slow used when db is not full (bsc#1092874) - CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162). - CVE-2018-1129: cephx signature check bypass (bsc#1096748). - CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1092874" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1094932" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162" ); script_set_attribute( attribute:"see_also", value:"https://ceph.com/releases/12-2-7-luminous-released/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-10861/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1128/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1129/" ); # https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?cb506ffa" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1494=1 SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1494=1 SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1494=1 SUSE CaaS Platform ALL : To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. SUSE CaaS Platform 3.0 : To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/06"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + sp); if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-0586-1.NASL description This update for ceph version 13.2.4 fixes the following issues : Security issues fixed : CVE-2018-14662: Fixed an issue with LUKS last seen 2020-06-01 modified 2020-06-02 plugin id 122809 published 2019-03-13 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/122809 title SUSE SLED15 / SLES15 Security Update : ceph (SUSE-SU-2019:0586-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:0586-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(122809); script_version("1.3"); script_cvs_date("Date: 2020/02/05"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129", "CVE-2018-14662", "CVE-2018-16846"); script_name(english:"SUSE SLED15 / SLES15 Security Update : ceph (SUSE-SU-2019:0586-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for ceph version 13.2.4 fixes the following issues : Security issues fixed : CVE-2018-14662: Fixed an issue with LUKS 'config-key' safety (bsc#1111177) CVE-2018-10861: Fixed an authorization bypass on OSD pool ops in ceph-mon (bsc#1099162) CVE-2018-1128: Fixed signature check bypass in cephx (bsc#1096748) CVE-2018-1129: Fixed replay attack in cephx protocol (bsc#1096748) CVE-2018-16846: Enforced bounds on max-keys/max-uploads/max-parts in rgw Non-security issues fixed: ceph-volume Python 3 fixes (bsc#1114567) fix python3 module loading (bsc#1086613) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1084645" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1086613" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1101262" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1111177" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1114567" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-10861/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1128/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1129/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-14662/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-16846/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20190586-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?c3125034" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-586=1 SUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-586=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mds"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mds-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mgr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mgr-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-mon-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-osd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-osd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-radosgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-radosgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-resource-agents"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python3-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rados-objclass-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-mirror"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-mirror-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-nbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:rbd-nbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:15"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2019/03/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/03/13"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED15|SLES15)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED15 / SLES15", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLES15 SP0", os_ver + " SP" + sp); if (os_ver == "SLED15" && (! preg(pattern:"^(0)$", string:sp))) audit(AUDIT_OS_NOT, "SLED15 SP0", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-base-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mds-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mgr-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mon-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-osd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-mirror-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-nbd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-common-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librados-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librados2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper1-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librbd-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librbd1-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librgw-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librgw2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-cephfs-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rados-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rbd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rgw-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLES15", sp:"0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-base-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mds-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mgr-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mon-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-osd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-fuse-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-mirror-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-nbd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-common-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librados-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librados2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper1-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librbd-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librbd1-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librgw-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librgw2-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-cephfs-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rados-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rbd-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rgw-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-3.7.2")) flag++; if (rpm_check(release:"SLED15", sp:"0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-3.7.2")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2177.NASL description An update for ceph is now available for Red Hat Ceph Storage 3.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es) : * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Previously, Ceph RADOS Gateway (RGW) instances in zones configured for multi-site replication would crash if configured to disable sync ( last seen 2020-06-01 modified 2020-06-02 plugin id 111145 published 2018-07-18 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111145 title RHEL 7 : Red Hat Ceph Storage 3.0 (RHSA-2018:2177) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2018:2177. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(111145); script_version("1.6"); script_cvs_date("Date: 2019/10/24 15:35:45"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_xref(name:"RHSA", value:"2018:2177"); script_name(english:"RHEL 7 : Red Hat Ceph Storage 3.0 (RHSA-2018:2177)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "An update for ceph is now available for Red Hat Ceph Storage 3.0 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es) : * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) : * Previously, Ceph RADOS Gateway (RGW) instances in zones configured for multi-site replication would crash if configured to disable sync ('rgw_run_sync_thread = false'). Therefor, multi-site replication environments could not start dedicated non-replication RGW instances. With this update, the 'rgw_run_sync_thread' option can be used to configure RGW instances that will not participate in replication even if their zone is replicated. (BZ#1552202) * Previously, when increasing 'max_mds' from '1' to '2', if the Metadata Server (MDS) daemon was in the starting/resolve state for a long period of time, then restarting the MDS daemon lead to assert. This caused the Ceph File System (CephFS) to be in degraded state. With this update, increasing 'max_mds' no longer causes CephFS to be in degraded state. (BZ#1566016) * Previously, the transition to containerized Ceph left some 'ceph-disk' unit files. The files were harmless, but appeared as failing. With this update, executing the 'switch-from-non-containerized-to-containerized-ceph-daemons.yml' playbook disables the 'ceph-disk' unit files too. (BZ#1577846) * Previously, the 'entries_behind_master' metric output from the 'rbd mirror image status' CLI tool did not always reduce to zero under synthetic workloads. This could cause a false alarm that there is an issue with RBD mirroring replications. With this update, the metric is now updated periodically without the need for an explicit I/O flush in the workload. (BZ#1578509) * Previously, when using the 'pool create' command with 'expected_num_objects', placement group (PG) directories were not pre-created at pool creation time as expected, resulting in performance drops when filestore splitting occurred. With this update, the 'expected_num_objects' parameter is now passed through to filestore correctly, and PG directories for the expected number of objects are pre-created at pool creation time. (BZ#1579039) * Previously, internal RADOS Gateway (RGW) multi-site sync logic behaved incorrectly when attempting to sync containers with S3 object versioning enabled. Objects in versioning-enabled containers would fail to sync in some scenarios--for example, when using 's3cmd sync' to mirror a filesystem directory. With this update, RGW multi-site replication logic has been corrected for the known failure cases. (BZ#1580497) * When restarting OSD daemons, the 'ceph-ansible' restart script goes through all the daemons by listing the units with systemctl list-units. Under certain circumstances, the output of the command contains extra spaces, which caused parsing and restart to fail. With this update, the underlying code has been changed to handle the extra space. * Previously, the Ceph RADOS Gateway (RGW) server treated negative byte-range object requests ('bytes=0--1') as invalid. Applications that expect the AWS behavior for negative or other invalid range requests saw unexpected errors and could fail. With this update, a new option 'rgw_ignore_get_invalid_range' has been added to RGW. When 'rgw_ignore_get_invalid_range' is set to 'true', the RGW behavior for invalid range requests is backwards compatible with AWS." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2177" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2018-1128" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2018-1129" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2018-10861" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-ansible"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-mds"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-radosgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:ceph-selinux"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-ansible"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-collectors"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cephmetrics-grafana-plugins"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libcephfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librados-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librbd-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librgw-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-ceph"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:nfs-ganesha-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:rbd-mirror"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2018/07/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/07/18"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2018:2177"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (! (rpm_exists(release:"RHEL7", rpm:"librados2-12.*\.el7cp"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Ceph Storage"); if (rpm_check(release:"RHEL7", reference:"ceph-ansible-3.0.39-1.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-base-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-common-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-debuginfo-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-fuse-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-mds-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-radosgw-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"ceph-selinux-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-1.0.1-1.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-ansible-1.0.1-1.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-collectors-1.0.1-1.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"cephmetrics-grafana-plugins-1.0.1-1.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libcephfs-devel-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libcephfs2-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librados-devel-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librados2-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"libradosstriper1-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librbd-devel-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librbd1-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librgw-devel-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"librgw2-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-2.5.5-6.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-ceph-2.5.5-6.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-debuginfo-2.5.5-6.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"nfs-ganesha-rgw-2.5.5-6.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-cephfs-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rados-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rbd-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python-rgw-12.2.4-30.el7cp")) flag++; if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"rbd-mirror-12.2.4-30.el7cp")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-ansible / ceph-base / ceph-common / ceph-debuginfo / ceph-fuse / etc"); } }
NASL family Fedora Local Security Checks NASL id FEDORA_2018-8738F5F4A7.NASL description New release (1:12.2.7-1) ---- New release (1:12.2.6-1) CVE-2018-1128 CVE-2018-1129 CVE-2018-10861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2018-08-07 plugin id 111559 published 2018-08-07 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111559 title Fedora 27 : 1:ceph (2018-8738f5f4a7) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory FEDORA-2018-8738f5f4a7. # include("compat.inc"); if (description) { script_id(111559); script_version("1.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_xref(name:"FEDORA", value:"2018-8738f5f4a7"); script_name(english:"Fedora 27 : 1:ceph (2018-8738f5f4a7)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "New release (1:12.2.7-1) ---- New release (1:12.2.6-1) CVE-2018-1128 CVE-2018-1129 CVE-2018-10861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2018-8738f5f4a7" ); script_set_attribute( attribute:"solution", value:"Update the affected 1:ceph package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:1:ceph"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:27"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/07"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! preg(pattern:"^27([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 27", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC27", reference:"ceph-12.2.7-1.fc27", epoch:"1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "1:ceph"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-854.NASL description This update for ceph fixes the following issues : Security issues fixed : - CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162) - CVE-2018-1129: cephx signature check bypass (bsc#1096748) - CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748) Bugs fixed in 12.2.7-420-gc0ef85b854 : - luminous: osd: eternal stuck PG in last seen 2020-06-05 modified 2018-08-10 plugin id 111635 published 2018-08-10 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111635 title openSUSE Security Update : ceph (openSUSE-2018-854) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2018-854. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(111635); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_name(english:"openSUSE Security Update : ceph (openSUSE-2018-854)"); script_summary(english:"Check for the openSUSE-2018-854 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update for ceph fixes the following issues : Security issues fixed : - CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162) - CVE-2018-1129: cephx signature check bypass (bsc#1096748) - CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748) Bugs fixed in 12.2.7-420-gc0ef85b854 : - luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932) - bluestore: db.slow used when db is not full (bsc#1092874) - Upstream fixes and improvements, see https://ceph.com/releases/12-2-7-luminous-released/ This update was imported from the SUSE:SLE-12-SP3:Update update project." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1092874" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1094932" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096748" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099162" ); script_set_attribute( attribute:"see_also", value:"https://ceph.com/releases/12-2-7-luminous-released/" ); script_set_attribute(attribute:"solution", value:"Update the affected ceph packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-resource-agents"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-ceph-compat"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-ceph-argparse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rados-objclass-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:42.3"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/10"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE42\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "42.3", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE42.3", reference:"ceph-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-base-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-base-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-fuse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-fuse-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mds-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mds-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mgr-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mgr-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mon-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-mon-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-osd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-osd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-radosgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-radosgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-resource-agents-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"ceph-test-debugsource-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libcephfs-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librados-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librados-devel-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librbd-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librgw-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-ceph-compat-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-ceph-argparse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-cephfs-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rados-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rgw-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"python3-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rados-objclass-devel-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-fuse-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-fuse-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-mirror-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-mirror-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-nbd-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if ( rpm_check(release:"SUSE42.3", reference:"rbd-nbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-12.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-test / ceph-test-debuginfo / ceph-test-debugsource / ceph / etc"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4339.NASL description Multiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was suspectible to replay attacks and calculated signatures incorrectly, last seen 2020-06-01 modified 2020-06-02 plugin id 118939 published 2018-11-14 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118939 title Debian DSA-4339-1 : ceph - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-4339. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(118939); script_version("1.1"); script_cvs_date("Date: 2018/11/14 14:36:20"); script_cve_id("CVE-2017-7519", "CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_xref(name:"DSA", value:"4339"); script_name(english:"Debian DSA-4339-1 : ceph - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Multiple vulnerabilities were discovered in Ceph, a distributed storage and file system: The cephx authentication protocol was suspectible to replay attacks and calculated signatures incorrectly, 'ceph mon' did not validate capabilities for pool operations (resulting in potential corruption or deletion of snapshot images) and a format string vulnerability in libradosstriper could result in denial of service." ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/ceph" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/stretch/ceph" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2018/dsa-4339" ); script_set_attribute( attribute:"solution", value: "Upgrade the ceph packages. For the stable distribution (stretch), these problems have been fixed in version 10.2.11-1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ceph"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0"); script_set_attribute(attribute:"patch_publication_date", value:"2018/11/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/11/14"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"9.0", prefix:"ceph", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-base", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-common", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-fs-common", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-fuse", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-mds", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-mon", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-osd", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-resource-agents", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"ceph-test", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libcephfs-dev", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libcephfs-java", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libcephfs-jni", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libcephfs1", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librados-dev", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librados2", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libradosstriper-dev", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"libradosstriper1", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librbd-dev", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librbd1", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librgw-dev", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"librgw2", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"python-ceph", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"python-cephfs", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"python-rados", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"python-rbd", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"radosgw", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"rbd-fuse", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"rbd-mirror", reference:"10.2.11-1")) flag++; if (deb_check(release:"9.0", prefix:"rbd-nbd", reference:"10.2.11-1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-1284.NASL description This update for ceph version 13.2.4 fixes the following issues : Security issues fixed : - CVE-2018-14662: Fixed an issue with LUKS last seen 2020-06-01 modified 2020-06-02 plugin id 124358 published 2019-04-29 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/124358 title openSUSE Security Update : ceph (openSUSE-2019-1284) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2019-1284. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(124358); script_version("1.2"); script_cvs_date("Date: 2020/01/21"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129", "CVE-2018-14662", "CVE-2018-16846"); script_name(english:"openSUSE Security Update : ceph (openSUSE-2019-1284)"); script_summary(english:"Check for the openSUSE-2019-1284 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update for ceph version 13.2.4 fixes the following issues : Security issues fixed : - CVE-2018-14662: Fixed an issue with LUKS 'config-key' safety (bsc#1111177) - CVE-2018-10861: Fixed an authorization bypass on OSD pool ops in ceph-mon (bsc#1099162) - CVE-2018-1128: Fixed signature check bypass in cephx (bsc#1096748) - CVE-2018-1129: Fixed replay attack in cephx protocol (bsc#1096748) - CVE-2018-16846: Enforced bounds on max-keys/max-uploads/max-parts in rgw (bsc#1114710) Non-security issues fixed : - ceph-volume Python 3 fixes (bsc#1114567) - Fixed python3 module loading (bsc#1086613) - Fixed an issue where ceph build fails (bsc#1084645) - ceph's SPDK builds with march=native (bsc#1101262) This update was imported from the SUSE:SLE-15:Update update project." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1084645" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086613" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096748" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099162" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101262" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1111177" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1114567" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1114710" ); script_set_attribute(attribute:"solution", value:"Update the affected ceph packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-common-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mds-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mgr-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-mon-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-osd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-radosgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-resource-agents"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ceph-test-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libcephfs2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librados2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libradosstriper1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librbd1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:librgw2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:python3-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rados-objclass-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-fuse-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-mirror-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:rbd-nbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2019/04/27"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/29"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE15.0", reference:"ceph-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-base-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-base-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-common-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-common-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-debugsource-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-fuse-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-fuse-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mds-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mds-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mgr-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mgr-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mon-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-mon-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-osd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-osd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-radosgw-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-radosgw-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-resource-agents-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"ceph-test-debugsource-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libcephfs-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libcephfs2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libcephfs2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librados-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librados-devel-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librados2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librados2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper1-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"libradosstriper1-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librbd-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librbd1-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librbd1-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librgw-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librgw2-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"librgw2-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-cephfs-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-cephfs-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rados-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rados-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rbd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rbd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rgw-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"python3-rgw-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rados-objclass-devel-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-fuse-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-fuse-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-mirror-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-mirror-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-nbd-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"rbd-nbd-debuginfo-13.2.4.125+gad802694f5-lp150.2.3.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph-test / ceph-test-debuginfo / ceph-test-debugsource / ceph / etc"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2478-1.NASL description This update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in last seen 2020-06-01 modified 2020-06-02 plugin id 112079 published 2018-08-23 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112079 title SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2478-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2018:2478-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(112079); script_version("1.4"); script_cvs_date("Date: 2019/09/10 13:51:48"); script_cve_id("CVE-2018-10861", "CVE-2018-1128", "CVE-2018-1129"); script_name(english:"SUSE SLED12 / SLES12 Security Update : ceph (SUSE-SU-2018:2478-1)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for ceph fixes the following issues : - Update to version 12.2.7-420-gc0ef85b854 : - https://ceph.com/releases/12-2-7-luminous-released/ - luminous: osd: eternal stuck PG in 'unfound_recovery' (bsc#1094932) - bluestore: db.slow used when db is not full (bsc#1092874) - CVE-2018-10861: Ensure that ceph-mon does perform authorization on all OSD pool ops (bsc#1099162). - CVE-2018-1129: cephx signature check bypass (bsc#1096748). - CVE-2018-1128: cephx protocol was vulnerable to replay attack (bsc#1096748). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1092874" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1094932" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1096748" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1099162" ); script_set_attribute( attribute:"see_also", value:"https://ceph.com/releases/12-2-7-luminous-released/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-10861/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1128/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-1129/" ); # https://www.suse.com/support/update/announcement/2018/suse-su-20182478-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?454e1918" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1494=1 SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1494=1 SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1494=1 SUSE CaaS Platform ALL : To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. SUSE CaaS Platform 3.0 : To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-common-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:ceph-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libcephfs2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librados2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:libradosstriper1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librbd1-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:librgw2-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-cephfs-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rados-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rbd-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:python-rgw-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/10"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/23"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLED12|SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED12 / SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP3", os_ver + " SP" + sp); if (os_ver == "SLED12" && (! preg(pattern:"^(3)$", string:sp))) audit(AUDIT_OS_NOT, "SLED12 SP3", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLES12", sp:"3", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-common-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"ceph-debugsource-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libcephfs2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librados2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"libradosstriper1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librbd1-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"librgw2-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-cephfs-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rados-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rbd-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (rpm_check(release:"SLED12", sp:"3", cpu:"x86_64", reference:"python-rgw-debuginfo-12.2.7+git.1531910353.c0ef85b854-2.12.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "ceph"); }
NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-2_0-0104_CEPH.NASL description An update of the ceph package has been released. last seen 2020-03-17 modified 2019-02-07 plugin id 121999 published 2019-02-07 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121999 title Photon OS 2.0: Ceph PHSA-2018-2.0-0104 NASL family Fedora Local Security Checks NASL id FEDORA_2018-327707371E.NASL description New release (1:12.2.6-1) Security fix for CVE-2018-1128 Security fix for CVE-2018-1129 Security fix for CVE-2018-10861 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2019-01-03 plugin id 120338 published 2019-01-03 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120338 title Fedora 28 : 1:ceph (2018-327707371e) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2261.NASL description An update for ceph is now available for Red Hat Ceph Storage 2.5 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es) : * ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128) * ceph: cephx uses weak signatures (CVE-2018-1129) * ceph: ceph-mon does not perform authorization on OSD pool ops (CVE-2018-10861) For more details about the security issue(s), including the impact, a CVSS score and other related information refer to the CVE page(s) listed in the Reference section. Enhancement(s) : * Ceph OSDs now logs when they shutdown due to disk operations timing out by default. (BZ#1568897) * The `radosgw-admin orphans find` command can inadvertently remove data objects still in use, if followed by another operation, such as, a `rados rm` command. Users are now warned before attempting to produce lists of potentially orphaned objects. (BZ#1573656) * The last seen 2020-06-01 modified 2020-06-02 plugin id 111364 published 2018-07-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111364 title RHEL 7 : Red Hat Ceph Storage 2.5 (RHSA-2018:2261)
Redhat
advisories |
| ||||||||||||||||
rpms |
|
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
- http://tracker.ceph.com/issues/24838
- http://tracker.ceph.com/issues/24838
- http://www.securityfocus.com/bid/104742
- http://www.securityfocus.com/bid/104742
- https://access.redhat.com/errata/RHSA-2018:2177
- https://access.redhat.com/errata/RHSA-2018:2177
- https://access.redhat.com/errata/RHSA-2018:2179
- https://access.redhat.com/errata/RHSA-2018:2179
- https://access.redhat.com/errata/RHSA-2018:2261
- https://access.redhat.com/errata/RHSA-2018:2261
- https://access.redhat.com/errata/RHSA-2018:2274
- https://access.redhat.com/errata/RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1593308
- https://bugzilla.redhat.com/show_bug.cgi?id=1593308
- https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
- https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
- https://www.debian.org/security/2018/dsa-4339
- https://www.debian.org/security/2018/dsa-4339