ceph is vulnerable to authorization bypass attacks. The vulnerability exists as a flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
tracker.ceph.com/issues/24838
www.securityfocus.com/bid/104742
access.redhat.com/errata/RHSA-2018:2177
access.redhat.com/errata/RHSA-2018:2179
access.redhat.com/errata/RHSA-2018:2261
access.redhat.com/errata/RHSA-2018:2274
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1532645
bugzilla.redhat.com/show_bug.cgi?id=1534657
bugzilla.redhat.com/show_bug.cgi?id=1549004
bugzilla.redhat.com/show_bug.cgi?id=1552202
bugzilla.redhat.com/show_bug.cgi?id=1552509
bugzilla.redhat.com/show_bug.cgi?id=1566016
bugzilla.redhat.com/show_bug.cgi?id=1569694
bugzilla.redhat.com/show_bug.cgi?id=1570597
bugzilla.redhat.com/show_bug.cgi?id=1575024
bugzilla.redhat.com/show_bug.cgi?id=1576861
bugzilla.redhat.com/show_bug.cgi?id=1576908
bugzilla.redhat.com/show_bug.cgi?id=1577846
bugzilla.redhat.com/show_bug.cgi?id=1578509
bugzilla.redhat.com/show_bug.cgi?id=1578572
bugzilla.redhat.com/show_bug.cgi?id=1579039
bugzilla.redhat.com/show_bug.cgi?id=1581403
bugzilla.redhat.com/show_bug.cgi?id=1581573
bugzilla.redhat.com/show_bug.cgi?id=1585748
bugzilla.redhat.com/show_bug.cgi?id=1593308
bugzilla.redhat.com/show_bug.cgi?id=1594974
bugzilla.redhat.com/show_bug.cgi?id=1598185
github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
www.debian.org/security/2018/dsa-4339