USN-4706-1: Ceph vulnerabilities
28 January 2021
Several security issues were fixed in Ceph.
Releases
Packages
- ceph - distributed storage and file system
Details
Olle Segerdahl found that ceph-mon and ceph-mgr daemons did not properly
restrict access, resulting in gaining access to unauthorized resources. An
authenticated user could use this vulnerability to modify the configuration and
possibly conduct further attacks. (CVE-2020-10736)
Adam Mohammed found that Ceph Object Gateway was vulnerable to HTTP header
injection via a CORS ExposeHeader tag. An attacker could use this to gain access
or cause a crash. (CVE-2020-10753)
Ilya Dryomov found that Cephx authentication did not verify Ceph clients
correctly and was then vulnerable to replay attacks in Nautilus. An attacker
could use the Ceph cluster network to authenticate via a packet sniffer and
perform actions. This issue is a reintroduction of CVE-2018-1128.
(CVE-2020-25660)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10
-
ceph
-
15.2.7-0ubuntu0.20.10.3
-
ceph-base
-
15.2.7-0ubuntu0.20.10.3
-
ceph-common
-
15.2.7-0ubuntu0.20.10.3
Ubuntu 20.04
-
ceph
-
15.2.7-0ubuntu0.20.04.2
-
ceph-base
-
15.2.7-0ubuntu0.20.04.2
-
ceph-common
-
15.2.7-0ubuntu0.20.04.2
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4528-1: ceph-base, ceph-fuse, python-ceph, python-cephfs, ceph-common, ceph-mon, ceph-osd, python3-ceph-argparse, python-rgw, librbd-dev, ceph, python3-rgw, librados-dev, librbd1, radosgw, rados-objclass-dev, rbd-mirror, libcephfs2, python-rbd, librgw-dev, libcephfs-dev, libcephfs-java, librados2, rbd-nbd, ceph-test, python-rados, libcephfs-jni, ceph-fs-common, ceph-mds, ceph-resource-agents, libradosstriper-dev, libradosstriper1, python3-rados, librgw2, python3-cephfs, libcephfs1, ceph-mgr, python3-rbd, rbd-fuse