Package "ceph-resource-agents"
  
    
    
        | Name: | ceph-resource-agents | 
    
        | Description:
 | OCF-compliant resource agents for Ceph | 
    
        | Latest version: | 12.2.13-0ubuntu0.18.04.11 | 
    
        | Release: | bionic (18.04) | 
    
        | Level: | security | 
    
        | Repository: | universe | 
         
            | Head package: | ceph | 
        
            | Homepage: | http://ceph.com/ | 
    
   
  
  
 
Links
    Download "ceph-resource-agents"
    
Other versions of "ceph-resource-agents" in Bionic
    
Changelog
    
    
    
        
        
    
    
        |   ceph (12.2.13-0ubuntu0.18.04.11) bionic-security; urgency=medium   * SECURITY UPDATE: non random key via key length flaw
- debian/patches/CVE-2021-3979.patch: honour osd_dmcrypt_key_size
 option in src/ceph-volume/ceph_volume/tests/util/test_encryption.py,
 src/ceph-volume/ceph_volume/util/encryption.py.
 - CVE-2021-3979
  -- Marc Deslauriers <email address hidden>  Wed, 19 Apr 2023 11:37:58 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2021-3979 | A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algo |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (12.2.13-0ubuntu0.18.04.10) bionic-security; urgency=medium   * SECURITY UPDATE: user credentials issue
- debian/patches/CVE-2020-27781-1.patch: fix PEP-8 SyntaxWarning in
 src/pybind/ceph_volume_client.py.
 - debian/patches/CVE-2020-27781-2.patch: disallow authorize auth_id in
 src/pybind/ceph_volume_client.py.
 - debian/patches/CVE-2020-27781-3.patch: preserve existing caps while
 authorize/deauthorize auth-id in src/pybind/ceph_volume_client.py.
 - debian/patches/CVE-2020-27781-4.patch: optionally authorize existing
 auth-ids in src/pybind/ceph_volume_client.py.
 - debian/patches/CVE-2020-27781-5.patch: add tests in
 qa/tasks/cephfs/test_volume_client.py.
 - CVE-2020-27781
 * SECURITY UPDATE: HTTP headers injection
 - debian/patches/CVE-2021-3524.patch: add more escaping to headers in
 src/rgw/rgw_cors.cc.
 - CVE-2021-3524
 * SECURITY UPDATE: denial of service in rgw
 - debian/patches/CVE-2021-3531.patch: checks empty subdir_name in
 src/rgw/rgw_rest_swift.cc.
 - CVE-2021-3531
 * This package does _not_ contain the changes from the
 12.2.13-0ubuntu0.18.04.9 package in bionic-proposed.
  -- Marc Deslauriers <email address hidden>  Fri, 24 Sep 2021 09:46:46 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2020-27781 | User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open S |  
                | CVE-2021-3524 | A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection |  
                | CVE-2021-3531 | A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (12.2.13-0ubuntu0.18.04.4) bionic-security; urgency=medium   * SECURITY UPDATE: XSS attacks
- debian/patches/CVE-2020-1760-1.patch: reject unauthenticated
 response-header actions in src/rgw/rgw_rest_s3.cc.
 - debian/patches/CVE-2020-1760-2.patch: change EPERM to
 ERR_INVALID_REQUEST in src/rgw/rgw_rest_s3.cc.
 - debian/patches/CVE-2020-1760-3.patch: reject control characters in
 response-header actions in src/rgw/rgw_rest_s3.cc.
 - CVE-2020-1760
 * SECURITY UPDATE: HTTP header injection
 - debian/patches/CVE-2020-10753.patch: sanitize newlines in
 src/rgw/rgw_cors.cc.
 - CVE-2020-10753
 * SECURITY UPDATE: DoS via invalid tagging XML
 - debian/patches/CVE-2020-12059.patch: check for tagging element in
 src/rgw/rgw_rest_s3.cc.
 - CVE-2020-12059
  -- Marc Deslauriers <email address hidden>  Wed, 09 Sep 2020 08:51:41 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2020-1760 | header-splitting in RGW GetObject has a possible XSS |  
                | CVE-2020-10753 | A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS |  
                | CVE-2020-12059 | An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exc |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (12.2.12-0ubuntu0.18.04.5) bionic-security; urgency=medium   * SECURITY UPDATE: DoS via RGW Beast front-end unexpected disconnects
- debian/patches/CVE-2020-1700.patch: avoid leaking connections in
 src/rgw/rgw_asio_frontend.cc.
 - CVE-2020-1700
  -- Marc Deslauriers <email address hidden>  Mon, 10 Feb 2020 11:12:03 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2020-1700 | A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making mult |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (12.2.12-0ubuntu0.18.04.2) bionic-security; urgency=medium   * SECURITY UPDATE: RADOS gateway remote denial of service
- d/p/CVE-2019-10222.patch: rgw: asio: check the remote endpoint
 before processing requests.
 - CVE-2019-10222
  -- Steve Beattie <email address hidden>  Tue, 27 Aug 2019 23:12:03 -0700 | 
    
        
        |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates