{"id":"USN-4035-1","summary":"ceph vulnerabilities","details":"It was discovered that Ceph incorrectly handled read only permissions. An\nauthenticated attacker could use this issue to obtain dm-crypt encryption\nkeys. This issue only affected Ubuntu 16.04 LTS. (CVE-2018-14662)\n\nIt was discovered that Ceph incorrectly handled certain OMAPs holding\nbucket indices. An authenticated attacker could possibly use this issue to\ncause a denial of service. This issue only affected Ubuntu 16.04 LTS.\n(CVE-2018-16846)\n\nIt was discovered that Ceph incorrectly sanitized certain debug logs. A\nlocal attacker could possibly use this issue to obtain encryption key\ninformation. This issue was only addressed in Ubuntu 18.10 and Ubuntu\n19.04. (CVE-2018-16889)\n\nIt was discovered that Ceph incorrectly handled certain civetweb requests.\nA remote attacker could possibly use this issue to consume resources,\nleading to a denial of service. This issue only affected Ubuntu 18.10 and\nUbuntu 19.04. (CVE-2019-3821)\n","modified":"2026-02-10T04:41:34Z","published":"2019-06-25T11:40:06Z","related":["UBUNTU-CVE-2018-14662","UBUNTU-CVE-2018-16846","UBUNTU-CVE-2018-16889"],"upstream":["CVE-2018-14662","CVE-2018-16846","CVE-2018-16889","CVE-2019-3821","UBUNTU-CVE-2018-14662","UBUNTU-CVE-2018-16846","UBUNTU-CVE-2018-16889","UBUNTU-CVE-2019-3821"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4035-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14662"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16846"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16889"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-3821"}],"affected":[{"package":{"name":"ceph","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ceph@10.2.11-0ubuntu0.16.04.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.2.11-0ubuntu0.16.04.2"}]}],"versions":["0.94.3-0ubuntu2","0.94.5-0ubuntu1","9.2.0-0ubuntu3","9.2.0-0ubuntu4","9.2.0-0ubuntu5","9.2.0-0ubuntu6","10.0.2-0ubuntu1","10.0.3-0ubuntu1","10.0.5-0ubuntu1","10.1.0-0ubuntu1","10.1.1-0ubuntu1","10.1.2-0ubuntu1","10.2.0-0ubuntu0.16.04.1","10.2.0-0ubuntu0.16.04.2","10.2.2-0ubuntu0.16.04.2","10.2.3-0ubuntu0.16.04.2","10.2.5-0ubuntu0.16.04.1","10.2.6-0ubuntu0.16.04.1","10.2.7-0ubuntu0.16.04.1","10.2.9-0ubuntu0.16.04.1","10.2.10-0ubuntu0.16.04.1","10.2.11-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"ceph","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-common","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-fs-common","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-fuse","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-mds","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-resource-agents","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"ceph-test","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libcephfs-dev","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libcephfs-java","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libcephfs-jni","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libcephfs1","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librados-dev","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librados2","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libradosstriper-dev","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"libradosstriper1","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librbd-dev","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librbd1","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librgw-dev","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"librgw2","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"python-ceph","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"python-cephfs","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"python-rados","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"python-rbd","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"radosgw","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"rbd-fuse","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"rbd-mirror","binary_version":"10.2.11-0ubuntu0.16.04.2"},{"binary_name":"rbd-nbd","binary_version":"10.2.11-0ubuntu0.16.04.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4035-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2018-14662","severity":[{"score":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-16846","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-16889","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}