USN-4528-1: Ceph vulnerabilities
22 September 2020
Several security issues were fixed in Ceph.
Releases
Packages
- ceph - distributed storage and file system
Details
Adam Mohammed discovered that Ceph incorrectly handled certain CORS
ExposeHeader tags. A remote attacker could possibly use this issue to
preform an HTTP header injection attack. (CVE-2020-10753)
Lei Cao discovered that Ceph incorrectly handled certain POST requests with
invalid tagging XML. A remote attacker could possibly use this issue to
cause Ceph to crash, leading to a denial of service. This issue only
affected Ubuntu 18.04 LTS. (CVE-2020-12059)
Robin H. Johnson discovered that Ceph incorrectly handled certain S3
requests. A remote attacker could possibly use this issue to perform a
XSS attack. (CVE-2020-1760)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
ceph
-
12.2.13-0ubuntu0.18.04.4
-
ceph-base
-
12.2.13-0ubuntu0.18.04.4
-
ceph-common
-
12.2.13-0ubuntu0.18.04.4
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4706-1: libradosstriper-dev, cephfs-shell, ceph-base, ceph-immutable-object-cache, python3-rados, libcephfs-java, ceph-common, ceph-resource-agents, ceph-fuse, librados-dev, librbd-dev, python3-rbd, libradosstriper1, libradospp-dev, python3-cephfs, ceph-mgr-dashboard, ceph-mds, radosgw, rbd-fuse, ceph-mgr-diskprediction-cloud, ceph-mgr-modules-core, ceph-mon, libcephfs-jni, python3-ceph-argparse, python3-rgw, ceph, cephadm, rados-objclass-dev, libcephfs-dev, ceph-mgr-diskprediction-local, librados2, rbd-mirror, ceph-mgr-cephadm, librgw-dev, librgw2, libcephfs2, ceph-osd, rbd-nbd, ceph-mgr-rook, ceph-mgr-k8sevents, librbd1, python3-ceph-common, ceph-mgr, python3-ceph