USN-6613-1: Ceph vulnerability
29 January 2024
Ceph could be made to bypass authorization checks if it received a specially crafted request.
Releases
Packages
- ceph - distributed storage and file system
Details
Lucas Henry discovered that Ceph incorrectly handled specially
crafted POST requests. An uprivileged user could use this to
bypass Ceph's authorization checks and upload a file to any bucket.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 22.04
-
ceph
-
17.2.6-0ubuntu0.22.04.3
-
ceph-base
-
17.2.6-0ubuntu0.22.04.3
-
ceph-common
-
17.2.6-0ubuntu0.22.04.3
Ubuntu 20.04
-
ceph
-
15.2.17-0ubuntu0.20.04.6
-
ceph-base
-
15.2.17-0ubuntu0.20.04.6
-
ceph-common
-
15.2.17-0ubuntu0.20.04.6
Ubuntu 18.04
-
ceph
-
12.2.13-0ubuntu0.18.04.11+esm1
Available with Ubuntu Pro
-
ceph-base
-
12.2.13-0ubuntu0.18.04.11+esm1
Available with Ubuntu Pro
-
ceph-common
-
12.2.13-0ubuntu0.18.04.11+esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
ceph
-
10.2.11-0ubuntu0.16.04.3+esm1
Available with Ubuntu Pro
-
ceph-common
-
10.2.11-0ubuntu0.16.04.3+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
ceph
-
0.80.11-0ubuntu1.14.04.4+esm2
Available with Ubuntu Pro
-
ceph-common
-
0.80.11-0ubuntu1.14.04.4+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.