Ubuntu Security Notice 5128-1 - Goutham Pacha Ravi, Jahson Babel, and John Garbutt discovered that user credentials in Ceph could be manipulated in certain environments. An attacker could use this to gain unintended access to resources. This issue only affected Ubuntu 18.04 LTS. It was discovered that Ceph contained an authentication flaw, leading to key reuse. An attacker could use this to cause a denial of service or possibly impersonate another user. This issue only affected Ubuntu 21.04. Various other issues were also addressed.
27bb8e3234a0eb6c20785c85e3b051d5fba1fadbce8594e9f21d51168b84a3bf
==========================================================================
Ubuntu Security Notice USN-5128-1
November 01, 2021
ceph vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Ceph.
Software Description:
- ceph: distributed storage and file system
Details:
Goutham Pacha Ravi, Jahson Babel, and John Garbutt discovered that user
credentials in Ceph could be manipulated in certain environments. An
attacker could use this to gain unintended access to resources. This issue
only affected Ubuntu 18.04 LTS. (CVE-2020-27781)
It was discovered that Ceph contained an authentication flaw, leading to
key reuse. An attacker could use this to cause a denial of service or
possibly impersonate another user. This issue only affected Ubuntu 21.04.
(CVE-2021-20288)
Sergey Bobrov discovered that the Ceph dashboard was susceptible to a
cross-site scripting attack. An attacker could use this to expose sensitive
information or gain unintended access. This issue only affected Ubuntu
21.04. (CVE-2021-3509)
Sergey Bobrov discovered that Ceph's RadosGW (Ceph Object Gateway) allowed
the injection of HTTP headers in responses to CORS requests. An attacker
could use this to violate system integrity. (CVE-2021-3524)
It was discovered that Ceph's RadosGW (Ceph Object Gateway) did not
properly handle GET requests for swift URLs in some situations, leading to
an application crash. An attacker could use this to cause a denial of
service. (CVE-2021-3531)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.04:
ceph 16.2.6-0ubuntu0.21.04.2
ceph-base 16.2.6-0ubuntu0.21.04.2
ceph-common 16.2.6-0ubuntu0.21.04.2
Ubuntu 18.04 LTS:
ceph 12.2.13-0ubuntu0.18.04.10
ceph-base 12.2.13-0ubuntu0.18.04.10
ceph-common 12.2.13-0ubuntu0.18.04.10
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5128-1
CVE-2020-27781, CVE-2021-20288, CVE-2021-3509, CVE-2021-3524,
CVE-2021-3531
Package Information:
https://launchpad.net/ubuntu/+source/ceph/16.2.6-0ubuntu0.21.04.2
https://launchpad.net/ubuntu/+source/ceph/12.2.13-0ubuntu0.18.04.10