Bug 28804 - ceph new security issue CVE-2021-20288
Summary: ceph new security issue CVE-2021-20288
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2021-04-18 22:48 CEST by David Walser
Modified: 2021-05-07 07:37 CEST (History)
4 users (show)

See Also:
Source RPM: ceph-15.2.9-1.mga8.src.rpm
CVE: CVE-2021-20288
Status comment:


Attachments

Description David Walser 2021-04-18 22:48:47 CEST
A security issue fixed upstream in Ceph has been announced on April 14:
https://www.openwall.com/lists/oss-security/2021/04/14/2

Mageia 8 is also affected.
David Walser 2021-04-18 22:48:58 CEST

Status comment: (none) => Patches available from upstream
Whiteboard: (none) => MGA8TOO

Comment 1 Chris Denice 2021-04-21 22:27:36 CEST
Thanks, I'll have a look and fix.
Comment 2 Chris Denice 2021-04-22 22:38:56 CEST
Bug fix release 15.2.11 landing in updates_testing, with the included security fixes as well as other bug fixes.

NB: Cauldron will follow, but I'd like to move to 16.0.* version on it.


Suggested advisory:
========================

Updated ceph packages fix security vulnerabilities CVE-2021-20288.

An authentication flaw was found in ceph. When the monitor handles
CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys,
allowing key reuse. An attacker who can request a global_id can exploit the
ability of any user to request a global_id previously associated with
another user, as ceph does not force the reuse of old keys to generate new
ones. The highest threat from this vulnerability is to data confidentiality
and integrity as well as system availability.



References:
https://www.openwall.com/lists/oss-security/2021/04/14/2
========================

Updated packages in core/updates_testing:
========================
ceph-mgr-15.2.11-1.mga8
ceph-15.2.11-1.mga8
ceph-radosgw-15.2.11-1.mga8
ceph-osd-15.2.11-1.mga8
lib64ceph2-15.2.11-1.mga8
lib64rados2-15.2.11-1.mga8
lib64radosgw2-15.2.11-1.mga8
lib64rgw2-15.2.11-1.mga8
ceph-rbd-15.2.11-1.mga8
lib64rbd1-15.2.11-1.mga8
ceph-mon-15.2.11-1.mga8
ceph-mds-15.2.11-1.mga8
lib64radosstriper1-15.2.11-1.mga8
python3-ceph-15.2.11-1.mga8
ceph-fuse-15.2.11-1.mga8
lib64rados-devel-15.2.11-1.mga8
ceph-immutable-object-cache-15.2.11-1.mga8
python3-rbd-15.2.11-1.mga8
python3-rgw-15.2.11-1.mga8
python3-rados-15.2.11-1.mga8
lib64ceph-devel-15.2.11-1.mga8
lib64rgw-devel-15.2.11-1.mga8
lib64radosstriper-devel-15.2.11-1.mga8
lib64rbd-devel-15.2.11-1.mga8
lib64radosgw-devel-15.2.11-1.mga8

from ceph-15.2.11-1.mga8.src.rpm

CVE: (none) => CVE-2021-20288
CC: (none) => eatdirt
Assignee: eatdirt => qa-bugs

Aurelien Oudelet 2021-04-23 19:33:28 CEST

Status comment: Patches available from upstream => (none)
CC: (none) => ouaurelien
Version: Cauldron => 8
Whiteboard: MGA8TOO => (none)

Comment 3 Thomas Andrews 2021-05-05 22:29:35 CEST
QA last saw this in Bug 28538. While Len Lawrence gave it a valiant try, it was eventually concluded that testing this was beyond the scope of qa, so we passed it on the basis of a clean install. Doing the same thing here.

Installed the above packages and dependencies in a VirtualBox MGA8-64 Plasma guest, 148 packages in all. No installation issues. Used the package list from Comment 2 in qarepo, again with no installation issues.

Giving this a 64-bit OK, and validating. Advisory in Comment 2.

Whiteboard: (none) => MGA8-64-OK
Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Aurelien Oudelet 2021-05-06 20:07:42 CEST

Keywords: (none) => advisory

Comment 4 Mageia Robot 2021-05-07 07:37:08 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2021-0207.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.