Lucene search

K
ibmIBMB5AB7B35EB008C2B416876F9325F00DCAAAA3BF938DB1DC9097750A9DD327EBE
HistoryJan 19, 2024 - 10:15 p.m.

Security Bulletin: IBM Storage Ceph is vulnerable to Access of Uninitialized Pointer in the RHEL UBI (CVE-2023-36054)

2024-01-1922:15:41
www.ibm.com
8
ibm storage ceph
rhel ubi
cve-2023-36054
vulnerability
upgrade

6.3 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

67.5%

Summary

RHEL UBI is used by IBM Storage Ceph as the base operating system. This bulletin identifies the steps to take to address the vulnerability in RHEL. CVE-2023-36054

Vulnerability Details

CVEID:CVE-2023-36054
**DESCRIPTION:**MIT Kerberos 5 (aka krb5) is vulnerable to a denial of service, caused by not validating the relationship between n_key_data and the key_data array count by the _xdr_kadm5_principal_ent_rec function. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a kadmind crash.
CVSS Base score: 8.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/262966 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Storage Ceph <6.1z3
IBM Storage Ceph 5.3z1-z5

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.
Download the latest version of IBM Storage Ceph and upgrade to 6.1z3 by following instructions.

<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/&gt;
<https://www.ibm.com/docs/en/storage-ceph/6?topic=upgrading&gt;

Workarounds and Mitigations

None