ceph (12.2.11+dfsg1-2.1+deb10u1) buster-security; urgency=medium
authorBastien Roucariès <rouca@debian.org>
Sat, 21 Oct 2023 16:42:26 +0000 (17:42 +0100)
committerBastien Roucariès <rouca@debian.org>
Sat, 21 Oct 2023 16:42:26 +0000 (17:42 +0100)
commit57d2b5c8e2af75ce966625bc80e5a5bf387816ed
treeb27622e5b039309421abed1a6ec0f0df51757823
parent4ecd473be1f91746e9dfa16ba37c0a93f246fb24
parentd5e30f09da93addd3c53e5406b0642ff127b9b05
ceph (12.2.11+dfsg1-2.1+deb10u1) buster-security; urgency=medium

  * Non-maintainer upload by the LTS Security Team.

  [ Stefano Rivera ]
  * Collection of minor security updates for Ceph.
  * CVE-2020-27781: Privilege Escalation: User credentials could be manipulated
    and stolen by Native CephFS consumers of OpenStack Manila, resulting in
    potential privilege escalation. An Open Stack Manila user can request
    access to a share to an arbitrary cephx user, including existing users.
    The access key is retrieved via the interface drivers. Then, all users of
    the requesting OpenStack project can view the access key. This enables the
    attacker to target any resource that the user has access to. This can be
    done to even "admin" users, compromising the ceph administrator.
  * CVE-2021-20288: Potential Privilege Escalation: When handling
    CEPHX_GET_PRINCIPAL_SESSION_KEY requests, ignore CEPH_ENTITY_TYPE_AUTH in
    CephXServiceTicketRequest::keys.
  * CVE-2020-1760: XSS: A flaw was found in the Ceph Object Gateway, where it
    supports request sent by an anonymous user in Amazon S3. This flaw could
    lead to potential XSS attacks due to the lack of proper neutralization of
    untrusted input.
  * CVE-2020-25678: Information Disclosure: ceph stores mgr module passwords
    in clear text. This can be found by searching the mgr logs for grafana and
    dashboard, with passwords visible.
  * CVE-2019-10222: Denial of service: An unauthenticated attacker could crash
    the Ceph RGW server by sending valid HTTP headers and terminating the
    connection, resulting in a remote denial of service for Ceph RGW clients.
  * CVE-2020-10753 and CVE-2021-3524: Header Injection: It was possible to
    inject HTTP headers via a CORS ExposeHeader tag in an Amazon S3 bucket. The
    newline character in the ExposeHeader tag in the CORS configuration file
    generates a header injection in the response when the CORS request is
    made.
  * CVE-2020-12059: Denial of Service: A POST request with an invalid tagging
    XML could crash the RGW process by triggering a NULL pointer exception.
  * CVE-2020-1700: Denial of Service: A flaw was found in the way the Ceph RGW
    Beast front-end handles unexpected disconnects. An authenticated attacker
    can abuse this flaw by making multiple disconnect attempts resulting in a
    permanent leak of a socket connection by radosgw. This flaw could lead to
    a denial of service condition by pile up of CLOSE_WAIT sockets, eventually
    leading to the exhaustion of available resources, preventing legitimate
    users from connecting to the system.
  * CVE-2021-3531: Denial of Service: When processing a GET Request in Ceph
    Storage RGW for a swift URL that ends with two slashes it could cause the
    rgw to crash, resulting in a denial of service.
  * CVE-2021-3979: Loss of Confidentiality: A key length flaw was found in
    Ceph Storage. An attacker could exploit the fact that the key length is
    incorrectly passed in an encryption algorithm to create a non random key,
    which is weaker and can be exploited for loss of confidentiality and
    integrity on encrypted disks.

  [ Bastien Roucariès ]

  * CVE-2023-43040: A flaw was found in Ceph RGW. An unprivileged
    user can write to any bucket(s) accessible by a given key
    if a POST's form-data contains a key called 'bucket'
    with a value matching the name of the bucket used to sign
    the request. The result of this is that a user could actually
    upload to any bucket accessible by the specified access key
    as long as the bucket in the POST policy matches the bucket
    in said POST form part. (Closes: #1053690)

[dgit import unpatched ceph 12.2.11+dfsg1-2.1+deb10u1]
133 files changed:
debian/.gitlab-ci.yml
debian/README.Debian
debian/ceph-base.install
debian/ceph-base.postinst
debian/ceph-base.prerm
debian/ceph-common.install
debian/ceph-common.lintian-overrides
debian/ceph-common.logrotate
debian/ceph-common.maintscript
debian/ceph-common.manpages
debian/ceph-common.postinst
debian/ceph-common.postrm
debian/ceph-common.rbdmap.init
debian/ceph-fuse.lintian-overrides
debian/ceph-fuse.manpages
debian/ceph-mds.dirs
debian/ceph-mds.install
debian/ceph-mds.lintian-overrides
debian/ceph-mds.maintscript
debian/ceph-mds.postinst
debian/ceph-mds.prerm
debian/ceph-mgr.install
debian/ceph-mgr.lintian-overrides
debian/ceph-mgr.postinst
debian/ceph-mgr.prerm
debian/ceph-mon.install
debian/ceph-mon.lintian-overrides
debian/ceph-mon.postinst
debian/ceph-mon.prerm
debian/ceph-osd.install
debian/ceph-osd.lintian-overrides
debian/ceph-osd.postinst
debian/ceph-osd.prerm
debian/ceph-resource-agents.install
debian/ceph-test.install
debian/ceph-test.jlibs
debian/ceph.NEWS
debian/ceph.maintscript
debian/changelog
debian/clean
debian/compat
debian/control
debian/copyright
debian/etc/default/ceph
debian/etc/pm/sleep.d/25-ceph
debian/gbp.conf
debian/lib-systemd/system-sleep/ceph
debian/lib-systemd/system/ceph-create-keys.service
debian/lib-systemd/system/ceph-mds.service
debian/lib-systemd/system/ceph-mon.service
debian/lib-systemd/system/ceph-osd@.service
debian/libcephfs-dev.install
debian/libcephfs-jni.install
debian/libcephfs2.install
debian/libcephfs2.symbols
debian/librados-dev.install
debian/librados2.install
debian/librados2.symbols
debian/libradosstriper-dev.install
debian/libradosstriper1.install
debian/libradosstriper1.symbols
debian/librbd-dev.install
debian/librbd1.install
debian/librbd1.symbols
debian/librgw-dev.install
debian/librgw2.install
debian/man/ceph-crush-location.1
debian/man/mount.fuse.ceph.8
debian/missing-sources/qa/workunits/erasure-code/jquery.flot.js
debian/missing-sources/src/civetweb/examples/docroot/jquery.js
debian/missing-sources/src/civetweb/test/ajax/jquery.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/bootstrap/js/bootstrap.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/dist/js/app.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/plugins/datatables/dataTables.bootstrap.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/plugins/datatables/jquery.dataTables.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/plugins/ionslider/ion.rangeSlider.js
debian/missing-sources/src/pybind/mgr/dashboard/static/AdminLTE-2.3.7/plugins/jQuery/jquery-2.2.3.js
debian/missing-sources/src/pybind/mgr/dashboard/static/libs/Chart.js/2.4.0/Chart.js
debian/missing-sources/src/pybind/mgr/dashboard/static/libs/moment.js/2.17.1/moment.js
debian/missing-sources/src/pybind/mgr/dashboard/static/libs/rivets/0.9.6/rivets.bundled.js
debian/missing-sources/src/pybind/mgr/dashboard/static/libs/underscore.js/1.8.3/underscore.js
debian/not-installed
debian/patches/0001-CoreLocalArray-class.patch
debian/patches/0002-core-local-array-type-conversions.patch
debian/patches/0003-Core-local-statistics.patch
debian/patches/0010-fix-various-spelling-errors.patch
debian/patches/0013-remove-ceph.com-ref-to-favicon.patch
debian/patches/0033-CVE-2023-43040-rgw-Fix-bucket-validation-against-POS.patch
debian/patches/32-bit-ftbfs.patch
debian/patches/CVE-2019-10222.patch
debian/patches/CVE-2020-10753.patch
debian/patches/CVE-2020-12059.patch
debian/patches/CVE-2020-1700.patch
debian/patches/CVE-2020-1760-1.patch
debian/patches/CVE-2020-1760-2.patch
debian/patches/CVE-2020-1760-3.patch
debian/patches/CVE-2020-25678-1.patch
debian/patches/CVE-2020-25678-2.patch
debian/patches/CVE-2020-27781-1.patch
debian/patches/CVE-2020-27781-2.patch
debian/patches/CVE-2020-27781-3.patch
debian/patches/CVE-2020-27781-4.patch
debian/patches/CVE-2020-27781-5.patch
debian/patches/CVE-2021-20288.patch
debian/patches/CVE-2021-3524.patch
debian/patches/CVE-2021-3531.patch
debian/patches/CVE-2021-3979.patch
debian/patches/armhf-ftbfs.patch
debian/patches/boost-1.67-fixes.patch
debian/patches/fix-var-run-perms-sysvinit.patch
debian/patches/libatomic.patch
debian/patches/radosgw-linkage-without-beast.patch
debian/patches/rocksdb-fallthrough-i386.patch
debian/patches/series
debian/patches/softfp-armel.patch
debian/patches/virtualenv-never-download.patch
debian/python-cephfs.install
debian/radosgw.init
debian/radosgw.lintian-overrides
debian/radosgw.maintscript
debian/radosgw.postinst
debian/radosgw.prerm
debian/rbd-mirror.lintian-overrides
debian/rules
debian/source/format
debian/source/lintian-overrides
debian/tests/build-rados
debian/tests/build-rbd
debian/tests/ceph-client
debian/tests/control
debian/tests/python-ceph
debian/tests/python3-ceph
debian/watch