ceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium
authorBastien Roucariès <rouca@debian.org>
Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)
committerBastien Roucariès <rouca@debian.org>
Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)
commit336c6a814a45a7cd511834d967036766668b42c2
tree142d14a4f1327eb032aca0246f6ba6d73973427b
parent5d6e8f9554f2e2f7226be66a1ad21553c5fb2027
parente1d7b6da1814e81770a01b0fa7065e0d734996ee
ceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium

  [ Thomas Goirand ]

  * CVE-2022-3650: privilege escalation from the ceph user to root. Applied
    upstream patches (Closes: #1024932).

  [ Bastien Roucariès ]
  * CVE-2021-3979:
    A key length flaw was found. An attacker can exploit the
    fact that the key length is incorrectly passed in an
    encryption algorithm to create a non random key,
    which is weaker and can be exploited for loss of
    confidentiality and integrity on encrypted disks.
  * CVE-2023-43040 rgw: Fix bucket validation against POST policies
    (Closes: #1053690)
  * CVE-2025-52555: an unprivileged user can escalate to root
    privileges in a ceph-fuse mounted CephFS by chmod 777
    a directory owned by root to gain access. The result
    of this is that a user could read, write and execute
    to any directory owned by root as long as they chmod
    777 it. This impacts confidentiality, integrity, and availability.
    (Closes: #1108410)

[dgit import unpatched ceph 14.2.21-1+deb11u1]
106 files changed:
debian/.gitlab-ci.yml
debian/README.Debian
debian/calc-max-parallel.sh
debian/ceph-base.ceph.init
debian/ceph-base.dirs
debian/ceph-base.docs
debian/ceph-base.install
debian/ceph-base.postinst
debian/ceph-base.postrm
debian/ceph-common.install
debian/ceph-common.lintian-overrides
debian/ceph-common.manpages
debian/ceph-common.postinst
debian/ceph-common.postrm
debian/ceph-common.preinst
debian/ceph-common.rbdmap.init
debian/ceph-fs-common.install
debian/ceph-fuse.lintian-overrides
debian/ceph-fuse.manpages
debian/ceph-mds.lintian-overrides
debian/ceph-mds.postinst
debian/ceph-mgr-k8sevents.install
debian/ceph-mgr-k8sevents.postinst
debian/ceph-mgr.install
debian/ceph-mon.postinst
debian/ceph-osd.install
debian/ceph.NEWS
debian/ceph.lintian-overrides
debian/changelog
debian/clean
debian/compat
debian/control
debian/copyright
debian/gbp.conf
debian/lib-systemd/system-sleep/ceph
debian/lib-systemd/system/ceph-create-keys.service
debian/lib-systemd/system/ceph-mds.service
debian/lib-systemd/system/ceph-mon.service
debian/lib-systemd/system/ceph-osd@.service
debian/libcephfs-dev.install
debian/libcephfs-jni.install
debian/libcephfs-jni.lintian-overrides
debian/libcephfs2.install
debian/libcephfs2.lintian-overrides
debian/libcephfs2.symbols
debian/librados-dev.install
debian/librados2.install
debian/librados2.lintian-overrides
debian/librados2.symbols
debian/libradosstriper-dev.install
debian/libradosstriper1.install
debian/libradosstriper1.symbols
debian/librbd-dev.install
debian/librbd1.install
debian/librbd1.symbols
debian/librgw-dev.install
debian/librgw2.install
debian/man/ceph-crush-location.1
debian/man/mount.fuse.ceph.8
debian/missing-sources/bootstrap.js
debian/missing-sources/two.js
debian/patches/32bit-avoid-overloading.patch
debian/patches/32bit-avoid-size_t.patch
debian/patches/CVE-2021-3979.patch
debian/patches/CVE-2022-3650_1_ceph-crash_drop_privleges_to_run_as_ceph_user_rather_than_root.patch
debian/patches/CVE-2022-3650_2_ceph-crash_fix_stderr_handling.patch
debian/patches/CVE-2023-43040.patch
debian/patches/CVE-2025-52555-1.patch
debian/patches/CVE-2025-52555-2.patch
debian/patches/add-option-to-disable-ceph-dencoder.patch
debian/patches/allow-bgp-to-host.patch
debian/patches/another-cmakelists-fix.patch
debian/patches/bluefs-use-uint64_t-for-len.patch
debian/patches/civetweb-755-1.8-somaxconn-configurable.patch
debian/patches/civetweb-755-1.8-somaxconn-configurable_conf.patch
debian/patches/civetweb-755-1.8-somaxconn-configurable_test.patch
debian/patches/cmake_add_1.74_to_known_versions.patch
debian/patches/cmake_define_BOOST_ASIO_USE_TS_EXECUTOR_AS_DEFAULT_for_Boost.Asio_users.patch
debian/patches/debian-armel-armhf-buildflags.patch
debian/patches/disable-crypto.patch
debian/patches/fix-bash-completion-location
debian/patches/fix-ceph-osd-systemd-target.patch
debian/patches/make-ceph-python-3.9-aware.patch
debian/patches/mds-purgequeue-use_uint64_t.patch
debian/patches/riscv64-link-pthread.patch
debian/patches/series
debian/patches/update-java-source-target-flags.patch
debian/python3-ceph.lintian-overrides
debian/radosgw.install
debian/radosgw.lintian-overrides
debian/radosgw.postinst
debian/radosgw.prerm
debian/rest-bench.install
debian/rules
debian/source.lintian-overrides
debian/source/format
debian/source/lintian-overrides
debian/source/options
debian/tests/build-rados
debian/tests/build-rbd
debian/tests/ceph-client
debian/tests/control
debian/tests/python-ceph
debian/udev/95-ceph-osd-lvm.rules
debian/watch
debian/workarounds/ceph-dencoder-oom