<html>
<head>
<base href="https://bugzilla.rosalinux.ru/">
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Platform</th>
<td>2021.1
</td>
</tr>
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_CONFIRMED "
title="CONFIRMED - [CVE 21] ceph 15.2.7 CVEs found"
href="https://bugzilla.rosalinux.ru/show_bug.cgi?id=13502">13502</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>[CVE 21] ceph 15.2.7 CVEs found
</td>
</tr>
<tr>
<th>Classification</th>
<td>ROSA-based products
</td>
</tr>
<tr>
<th>Product</th>
<td>ROSA Fresh
</td>
</tr>
<tr>
<th>Version</th>
<td>All
</td>
</tr>
<tr>
<th>Hardware</th>
<td>All
</td>
</tr>
<tr>
<th>URL</th>
<td>CVE-2020-25678, CVE-2020-27781, CVE-2020-27839, CVE-2022-0670,
</td>
</tr>
<tr>
<th>OS</th>
<td>Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>CONFIRMED
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>Normal
</td>
</tr>
<tr>
<th>Component</th>
<td>System (kernel, glibc, systemd, bash, PAM...)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>Reporter</th>
<td>y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>QA Contact</th>
<td>bugs@lists.rosalinux.ru
</td>
</tr>
<tr>
<th>CC</th>
<td>e.kosachev@rosalinux.ru, s.matveev@rosalinux.ru, y.tumanov@rosalinux.ru
</td>
</tr>
<tr>
<th>Target Milestone</th>
<td>---
</td>
</tr>
<tr>
<th>Flags</th>
<td>secteam_verified?
</td>
</tr></table>
<p>
<div>
<pre>Please patch CVEs for package ceph version 15.2.7
INFO (CVEs are): ceph 15.2.7
cves found
CVE-2020-25678
Desc: A flaw was found in ceph in versions prior to 16.y.z where ceph stores
mgr module passwords in clear text. This can be found by searching the mgr logs
for grafana and dashboard, with passwords visible.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25678">https://nvd.nist.gov/vuln/detail/CVE-2020-25678</a>
Severity: MEDIUM
CVE-2020-27781
Desc: User credentials can be manipulated and stolen by Native CephFS consumers
of OpenStack Manila, resulting in potential privilege escalation. An Open Stack
Manila user can request access to a share to an arbitrary cephx user, including
existing users. The access key is retrieved via the interface drivers. Then,
all users of the requesting OpenStack project can view the access key. This
enables the attacker to target any resource that the user has access to. This
can be done to even "admin" users, compromising the ceph administrator. This
flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x
prior to 16.2.0.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27781">https://nvd.nist.gov/vuln/detail/CVE-2020-27781</a>
Severity: HIGH
CVE-2020-27839
Desc: A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for
user authentication is stored by the frontend application in the browser’s
localStorage which is potentially vulnerable to attackers via XSS attacks. The
highest threat from this vulnerability is to data confidentiality and
integrity.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-27839">https://nvd.nist.gov/vuln/detail/CVE-2020-27839</a>
Severity: MEDIUM
CVE-2022-0670
Desc: A flaw was found in Openstack manilla owning a Ceph File system "share",
which enables the owner to read/write any manilla share or entire file system.
The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This
allows an attacker to compromise Confidentiality and Integrity of a file
system. Fixed in RHCS 5.2 and Ceph 17.2.2.
Link: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0670">https://nvd.nist.gov/vuln/detail/CVE-2022-0670</a>
Severity: CRITICAL</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>