Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in Ceph
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in Ceph
ID: USN-6613-1
Distribution: Ubuntu
Plattformen: Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 16.04 LTS (Available with Ubuntu Pro), Ubuntu 14.04 LTS (Available with Ubuntu Pro), Ubuntu 18.04 LTS (Available with Ubuntu Pro), Ubuntu 23.10
Datum: Mo, 29. Januar 2024, 21:35
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040
Applikationen: Ceph

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============9187400457586935365==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------xC0FSoxw4e6X0jVd0NpzWv0U"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------xC0FSoxw4e6X0jVd0NpzWv0U
Content-Type: multipart/mixed;
boundary="------------ZzYbziQLnM9pElK28RPxlj0K";
protected-headers="v1"
From: Nick Galanis <nick.galanis@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <b44b94e5-b7a4-4cea-b5a2-26f519bd2e33@canonical.com>
Subject: [USN-6613-1] Ceph vulnerability

--------------ZzYbziQLnM9pElK28RPxlj0K
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-6613-1
January 29, 2024

ceph vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Ceph could be made to bypass authorization checks if it received a
specially crafted request.

Software Description:
- ceph: distributed storage and file system

Details:

Lucas Henry discovered that Ceph incorrectly handled specially
crafted POST requests. An uprivileged user could use this to
bypass Ceph's authorization checks and upload a file to any bucket.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
ceph 18.2.0-0ubuntu3.1
ceph-base 18.2.0-0ubuntu3.1
ceph-common 18.2.0-0ubuntu3.1

Ubuntu 22.04 LTS:
ceph 17.2.6-0ubuntu0.22.04.3
ceph-base 17.2.6-0ubuntu0.22.04.3
ceph-common 17.2.6-0ubuntu0.22.04.3

Ubuntu 20.04 LTS:
ceph 15.2.17-0ubuntu0.20.04.6
ceph-base 15.2.17-0ubuntu0.20.04.6
ceph-common 15.2.17-0ubuntu0.20.04.6

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
ceph 12.2.13-0ubuntu0.18.04.11+esm1
ceph-base 12.2.13-0ubuntu0.18.04.11+esm1
ceph-common 12.2.13-0ubuntu0.18.04.11+esm1

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
ceph 10.2.11-0ubuntu0.16.04.3+esm1
ceph-common 10.2.11-0ubuntu0.16.04.3+esm1

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
ceph 0.80.11-0ubuntu1.14.04.4+esm2
ceph-common 0.80.11-0ubuntu1.14.04.4+esm2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6613-1
CVE-2023-43040

Package Information:
https://launchpad.net/ubuntu/+source/ceph/18.2.0-0ubuntu3.1
https://launchpad.net/ubuntu/+source/ceph/17.2.6-0ubuntu0.22.04.3
https://launchpad.net/ubuntu/+source/ceph/15.2.17-0ubuntu0.20.04.6

--------------ZzYbziQLnM9pElK28RPxlj0K--

--------------xC0FSoxw4e6X0jVd0NpzWv0U
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEE5rkwSLC9ntq84w397Dtram9gyMMFAmW38V8FAwAAAAAACgkQ7Dtram9gyMNU
gQf/fh8fz6oUrto8sDbuN4QNZOhvCtRrPBOVyRgp1RQiio21MmFB0TLnGYQCrtu00pJuJOKUCyoI
UoiN4rNeUDLvDmdfzNM0SfD0LYcpCiG1+/VkZD8e+kYmxvoQAH+2fEhbIxPDfFfDsjwVm6MzFPZC
naqjBebeHfRmoLulNfpxLe3s04QIITl2/p+vNSebfk4fyYf/b0/x9CLYiHeR8n7xU6AatIj9vmTE
7OkgnNoMd9aN3uXFX1TKSivmQa/w+RYIOPBHQLWUQkHTs7FXmpbS6a6jsmO0dPZuL3ee9/VbNfBk
tu4DMn3bZT5YKIuzsH0YFMMEqaK9X+b61SHvW4oEGg==
=TTAS
-----END PGP SIGNATURE-----

--------------xC0FSoxw4e6X0jVd0NpzWv0U--


--===============9187400457586935365==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============9187400457586935365==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung