drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in Ceph
Name: |
Mangelnde Rechteprüfung in Ceph |
|
ID: |
USN-6613-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 14.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro), Ubuntu 23.10 |
|
Datum: |
Mo, 29. Januar 2024, 21:35 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040 |
|
Applikationen: |
Ceph |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============9187400457586935365== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------xC0FSoxw4e6X0jVd0NpzWv0U"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------xC0FSoxw4e6X0jVd0NpzWv0U Content-Type: multipart/mixed; boundary="------------ZzYbziQLnM9pElK28RPxlj0K"; protected-headers="v1" From: Nick Galanis <nick.galanis@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <b44b94e5-b7a4-4cea-b5a2-26f519bd2e33@canonical.com> Subject: [USN-6613-1] Ceph vulnerability
--------------ZzYbziQLnM9pElK28RPxlj0K Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-6613-1 January 29, 2024
ceph vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) - Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Ceph could be made to bypass authorization checks if it received a specially crafted request.
Software Description: - ceph: distributed storage and file system
Details:
Lucas Henry discovered that Ceph incorrectly handled specially crafted POST requests. An uprivileged user could use this to bypass Ceph's authorization checks and upload a file to any bucket.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10: ceph 18.2.0-0ubuntu3.1 ceph-base 18.2.0-0ubuntu3.1 ceph-common 18.2.0-0ubuntu3.1
Ubuntu 22.04 LTS: ceph 17.2.6-0ubuntu0.22.04.3 ceph-base 17.2.6-0ubuntu0.22.04.3 ceph-common 17.2.6-0ubuntu0.22.04.3
Ubuntu 20.04 LTS: ceph 15.2.17-0ubuntu0.20.04.6 ceph-base 15.2.17-0ubuntu0.20.04.6 ceph-common 15.2.17-0ubuntu0.20.04.6
Ubuntu 18.04 LTS (Available with Ubuntu Pro): ceph 12.2.13-0ubuntu0.18.04.11+esm1 ceph-base 12.2.13-0ubuntu0.18.04.11+esm1 ceph-common 12.2.13-0ubuntu0.18.04.11+esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro): ceph 10.2.11-0ubuntu0.16.04.3+esm1 ceph-common 10.2.11-0ubuntu0.16.04.3+esm1
Ubuntu 14.04 LTS (Available with Ubuntu Pro): ceph 0.80.11-0ubuntu1.14.04.4+esm2 ceph-common 0.80.11-0ubuntu1.14.04.4+esm2
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-6613-1 CVE-2023-43040
Package Information: https://launchpad.net/ubuntu/+source/ceph/18.2.0-0ubuntu3.1 https://launchpad.net/ubuntu/+source/ceph/17.2.6-0ubuntu0.22.04.3 https://launchpad.net/ubuntu/+source/ceph/15.2.17-0ubuntu0.20.04.6
--------------ZzYbziQLnM9pElK28RPxlj0K--
--------------xC0FSoxw4e6X0jVd0NpzWv0U Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmW38V8FAwAAAAAACgkQ7Dtram9gyMNU gQf/fh8fz6oUrto8sDbuN4QNZOhvCtRrPBOVyRgp1RQiio21MmFB0TLnGYQCrtu00pJuJOKUCyoI UoiN4rNeUDLvDmdfzNM0SfD0LYcpCiG1+/VkZD8e+kYmxvoQAH+2fEhbIxPDfFfDsjwVm6MzFPZC naqjBebeHfRmoLulNfpxLe3s04QIITl2/p+vNSebfk4fyYf/b0/x9CLYiHeR8n7xU6AatIj9vmTE 7OkgnNoMd9aN3uXFX1TKSivmQa/w+RYIOPBHQLWUQkHTs7FXmpbS6a6jsmO0dPZuL3ee9/VbNfBk tu4DMn3bZT5YKIuzsH0YFMMEqaK9X+b61SHvW4oEGg== =TTAS -----END PGP SIGNATURE-----
--------------xC0FSoxw4e6X0jVd0NpzWv0U--
--===============9187400457586935365== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============9187400457586935365==--
|
|
|
|