- Issued:
- 2018-10-01
- Updated:
- 2018-10-01
RHSA-2018:2838 - Security Advisory
Synopsis
Critical: ceph-iscsi-cli security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for ceph-iscsi-cli is now available for Red Hat Ceph Storage 3.1 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
ceph-iscsi-cli provides a CLI interface similar to the targetcli tool used to interact with the kernel LIO subsystem.
Security Fix(es):
- It was found that rbd-target-api service provided by ceph-iscsi-cli was running in debug mode. An unauthenticated attacker could use this to remotely execute arbitrary code and escalate privileges. (CVE-2018-14649)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
Fixes
- BZ - 1632078 - CVE-2018-14649 ceph-iscsi-cli: rbd-target-api service runs in debug mode allowing for remote command execution
CVEs
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
ceph-iscsi-cli-2.7-7.el7cp.src.rpm | SHA-256: 5996f15819cc9c59560140fc0d52a2a293862d5a04b8976d483cff39b033b33d |
x86_64 | |
ceph-iscsi-cli-2.7-7.el7cp.noarch.rpm | SHA-256: d654cc7253a45f8c49e9ea09a118785d789a591310c10df25afb2b2ce4ccb62e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.