ALT-BU-2019-3652-1
Branch c8.1 update bulletin.
Package lightdm-gtk-greeter-pd updated to version 2.0.1.8-alt0.M80C.1 for branch c8.1 in task 228009.
Closed bugs
greeter-hide-users=true скрывает вообще указание пользователя
Closed vulnerabilities
BDU:2020-01537
Уязвимость системы хранения данных Ceph, связанная с ошибкой процедуры авторизации, позволяющая нарушителю получить несанкционированный доступ к ключам шифрования dm-crypt
BDU:2020-01538
Уязвимость системы хранения данных Ceph, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10861
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://tracker.ceph.com/issues/24838
- http://tracker.ceph.com/issues/24838
- 104742
- 104742
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1593308
- https://bugzilla.redhat.com/show_bug.cgi?id=1593308
- https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
- https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
- DSA-4339
- DSA-4339
Modified: 2024-11-21
CVE-2018-1129
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://tracker.ceph.com/issues/24837
- http://tracker.ceph.com/issues/24837
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- DSA-4339
- DSA-4339
Modified: 2024-11-21
CVE-2018-14662
It was found Ceph versions before 13.2.4 that authenticated ceph users with read only permissions could steal dm-crypt encryption keys used in ceph disk encryption.
- openSUSE-SU-2019:1284
- RHSA-2019:2538
- RHSA-2019:2541
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662
- https://ceph.com/releases/13-2-4-mimic-released
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1696-1] ceph security update
- [debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update
- USN-4035-1
- openSUSE-SU-2019:1284
- USN-4035-1
- [debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1696-1] ceph security update
- https://ceph.com/releases/13-2-4-mimic-released
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662
- RHSA-2019:2541
- RHSA-2019:2538
Modified: 2024-11-21
CVE-2018-16846
It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- RHSA-2019:2538
- RHSA-2019:2538
- RHSA-2019:2541
- RHSA-2019:2541
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846
- https://ceph.com/releases/13-2-4-mimic-released/
- https://ceph.com/releases/13-2-4-mimic-released/
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1696-1] ceph security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1696-1] ceph security update
- [debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update
- [debian-lts-announce] 20210810 [SECURITY] [DLA 2735-1] ceph security update
- USN-4035-1
- USN-4035-1
Modified: 2024-11-21
CVE-2018-16889
Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
Modified: 2024-11-21
CVE-2018-7262
In Ceph before 12.2.3 and 13.x through 13.0.1, the rgw_civetweb.cc RGWCivetWeb::init_env function in radosgw doesn't handle malformed HTTP headers properly, allowing for denial of service.
- http://tracker.ceph.com/issues/23039
- http://tracker.ceph.com/issues/23039
- RHSA-2018:0546
- RHSA-2018:0546
- RHSA-2018:0548
- RHSA-2018:0548
- https://bugzilla.redhat.com/show_bug.cgi?id=1546611
- https://bugzilla.redhat.com/show_bug.cgi?id=1546611
- https://github.com/ceph/ceph/pull/20488
- https://github.com/ceph/ceph/pull/20488
- FEDORA-2018-ed907ef9a0
- FEDORA-2018-ed907ef9a0