RHSA-2015:1092 - Security Advisory
Moderate: ceph-deploy security update
Security Advisory: Moderate
An updated ceph-deploy package that fixes two security issues is now
available for Red Hat Ceph Storage.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Red Hat Ceph Storage is a massively scalable, open, software-defined
storage platform that combines the most stable version of Ceph with a Ceph
management platform, deployment tools, and support services.
It was discovered that ceph-deploy, a utility for deploying Red Hat Ceph
Storage, would create the keyring file with world readable permissions,
which could possibly allow a local user to obtain authentication
credentials from the keyring file. (CVE-2015-3010, CVE-2015-4053)
All ceph-deploy users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
- Red Hat Ceph Storage 1.2 for RHEL 7 x86_64
- Red Hat Ceph Storage 1.2 for RHEL 6 x86_64
- BZ - 1210705 - CVE-2015-3010 ceph-deploy: keyring permissions are world readable in ~ceph
- BZ - 1224129 - CVE-2015-4053 ceph-deploy admin command copies keyring file to /etc/ceph which is world readable
Red Hat Ceph Storage 1.2 for RHEL 7
Red Hat Ceph Storage 1.2 for RHEL 6