Lucene search

K
ibmIBM931D233BB61A8EB014CD4F130450E7476509462C9DBCFD0BDF717FD988E15ABF
HistoryJan 18, 2024 - 9:45 p.m.

Security Bulletin: IBM Storage Ceph is vulnerable to Improper Authentication in the RHEL UBI (CVE-2023-27538)

2024-01-1821:45:02
www.ibm.com
8
ibm storage ceph
rhel ubi
curl libcurl
improper authentication
vulnerability
cve-2023-27538
version 6.1z3
security bulletin

AI Score

6.1

Confidence

High

EPSS

0

Percentile

15.7%

Summary

RHEL UBI is used by IBM Storage Ceph as the base operating system. [CVE-2023-27538] This bulletin identifies the steps to take to address the vulnerability.

Vulnerability Details

CVEID:CVE-2023-27538
**DESCRIPTION:**cURL libcurl could allow a local attacker to bypass security restrictions, caused by a SSH connection too eager reuse still flaw. By sending a specially crafted request, an attacker could exploit this vulnerability to reuse a previously created connection even when an SSH related option had been changed.
CVSS Base score: 4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/250533 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Storage Ceph <6.1z3
IBM Storage Ceph 5.3z1-z5

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.
Download the latest version of IBM Storage Ceph and upgrade to 6.1z3 by following instructions.

<https://public.dhe.ibm.com/ibmdl/export/pub/storage/ceph/&gt;
<https://www.ibm.com/docs/en/storage-ceph/6?topic=upgrading&gt;

Workarounds and Mitigations

None