Your submission was sent successfully! Close

USN-4706-1: Ceph vulnerabilities

28 January 2021

Several security issues were fixed in Ceph.



  • ceph - distributed storage and file system


Olle Segerdahl found that ceph-mon and ceph-mgr daemons did not properly
restrict access, resulting in gaining access to unauthorized resources. An
authenticated user could use this vulnerability to modify the configuration and
possibly conduct further attacks. (CVE-2020-10736)

Adam Mohammed found that Ceph Object Gateway was vulnerable to HTTP header
injection via a CORS ExposeHeader tag. An attacker could use this to gain access
or cause a crash. (CVE-2020-10753)

Ilya Dryomov found that Cephx authentication did not verify Ceph clients
correctly and was then vulnerable to replay attacks in Nautilus. An attacker
could use the Ceph cluster network to authenticate via a packet sniffer and
perform actions. This issue is a reintroduction of CVE-2018-1128.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.10
Ubuntu 20.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-4528-1: ceph-osd, rados-objclass-dev, python-ceph, python-rgw, librbd-dev, ceph-resource-agents, libcephfs1, ceph-base, ceph-test, librbd1, python3-rbd, radosgw, python3-cephfs, python-rbd, rbd-nbd, rbd-mirror, libcephfs2, ceph-fuse, librados-dev, librados2, ceph-mds, ceph-mon, rbd-fuse, ceph-fs-common, ceph-common, python-rados, python3-rados, librgw2, libcephfs-dev, libcephfs-jni, python3-rgw, python3-ceph-argparse, libcephfs-java, libradosstriper-dev, ceph, libradosstriper1, python-cephfs, ceph-mgr, librgw-dev