[USN-4706-1] Ceph vulnerabilities

Paulo Flabiano Smorigo pfsmorigo at canonical.com
Thu Jan 28 14:02:11 UTC 2021


==========================================================================
Ubuntu Security Notice USN-4706-1
January 28, 2021

ceph vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.10
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Ceph.

Software Description:
- ceph: distributed storage and file system

Details:

Olle Segerdahl found that ceph-mon and ceph-mgr daemons did not properly
restrict access, resulting in gaining access to unauthorized resources. An
authenticated user could use this vulnerability to modify the configuration and
possibly conduct further attacks. (CVE-2020-10736)

Adam Mohammed found that Ceph Object Gateway was vulnerable to HTTP header
injection via a CORS ExposeHeader tag. An attacker could use this to gain access
or cause a crash. (CVE-2020-10753)

Ilya Dryomov found that Cephx authentication did not verify Ceph clients
correctly and was then vulnerable to replay attacks in Nautilus. An attacker
could use the Ceph cluster network to authenticate via a packet sniffer and
perform actions. This issue is a reintroduction of CVE-2018-1128.
(CVE-2020-25660)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.10:
  ceph                            15.2.7-0ubuntu0.20.10.3
  ceph-base                       15.2.7-0ubuntu0.20.10.3
  ceph-common                     15.2.7-0ubuntu0.20.10.3

Ubuntu 20.04 LTS:
  ceph                            15.2.7-0ubuntu0.20.04.2
  ceph-base                       15.2.7-0ubuntu0.20.04.2
  ceph-common                     15.2.7-0ubuntu0.20.04.2

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4706-1
  CVE-2020-10736, CVE-2020-10753, CVE-2020-25660

Package Information:
  https://launchpad.net/ubuntu/+source/ceph/15.2.7-0ubuntu0.20.10.3
  https://launchpad.net/ubuntu/+source/ceph/15.2.7-0ubuntu0.20.04.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20210128/680769b8/attachment.sig>


More information about the ubuntu-security-announce mailing list