USN-4528-1: Ceph vulnerabilities
22 September 2020
Several security issues were fixed in Ceph.
Releases
Packages
- ceph - distributed storage and file system
Details
Adam Mohammed discovered that Ceph incorrectly handled certain CORS
ExposeHeader tags. A remote attacker could possibly use this issue to
preform an HTTP header injection attack. (CVE-2020-10753)
Lei Cao discovered that Ceph incorrectly handled certain POST requests with
invalid tagging XML. A remote attacker could possibly use this issue to
cause Ceph to crash, leading to a denial of service. This issue only
affected Ubuntu 18.04 LTS. (CVE-2020-12059)
Robin H. Johnson discovered that Ceph incorrectly handled certain S3
requests. A remote attacker could possibly use this issue to perform a
XSS attack. (CVE-2020-1760)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
ceph
-
12.2.13-0ubuntu0.18.04.4
-
ceph-base
-
12.2.13-0ubuntu0.18.04.4
-
ceph-common
-
12.2.13-0ubuntu0.18.04.4
Ubuntu 16.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4706-1: libcephfs-java, ceph-mgr-diskprediction-local, radosgw, cephadm, ceph-mds, libradosstriper-dev, ceph-mgr-rook, ceph-immutable-object-cache, librbd1, librados2, rbd-fuse, ceph-mgr, rados-objclass-dev, ceph, libcephfs2, ceph-mgr-k8sevents, python3-cephfs, python3-rbd, rbd-mirror, ceph-fuse, libradospp-dev, librgw-dev, ceph-common, ceph-mgr-diskprediction-cloud, rbd-nbd, python3-ceph-argparse, libcephfs-dev, librbd-dev, python3-ceph-common, ceph-mgr-cephadm, python3-rados, ceph-mgr-dashboard, libcephfs-jni, ceph-osd, librgw2, python3-rgw, cephfs-shell, libradosstriper1, ceph-mgr-modules-core, ceph-base, librados-dev, ceph-mon, python3-ceph, ceph-resource-agents