Bug 1833025 (CVE-2020-10736)
Summary: | CVE-2020-10736 ceph: authorization bypass in monitor and manager daemons | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Hardik Vyas <hvyas> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | adeza, branto, danmick, david, dbecker, fedora, gfidente, hvyas, i, jdurgin, jjoyce, josef, jschluet, kbasil, kkeithle, lhh, loic, lpeer, mburns, ramkrsna, sclewis, security-response-team, slinaber, srangach, steve |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | ceph 15.2.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
An authorization bypass vulnerability was found in Ceph versions 15.2.0 and later, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-05-19 03:04:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1825383 |
Description
Hardik Vyas
2020-05-07 16:47:37 UTC
Acknowledgments: Name: Olle Segerdahl Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Statement: This vulnerability affects Ceph versions 15.2.0 and later. The following products do not ship the flawed versions and are therefore not affected by this flaw: * Red Hat Ceph Storage * Red Hat OpenStack Platform Upstream patches: [master] https://github.com/ceph/ceph/commit/c7e7009a690621aacd4ac2c70c6469f25d692868 [v15.2.2] https://github.com/ceph/ceph/commit/f2cf2ce1bd9a86462510a7a12afa4e528b615df2 External References: https://ceph.io/releases/v15-2-2-octopus-released/ |