User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila. An OpenStack Manila user can request access to a share to any arbitrary cephx user, including privileged pre-existing users and the interface drivers will retrieve the access key of that user along with providing access to the share. This is then visible to all users of the OpenStack project that owns the share.
Acknowledgments: Name: Goutham Pacha Ravi (Red Hat), Jahson Babel (Centre de Calcul de l'IN2P3), John Garbutt (StackHPC)
Created ceph tracking bugs for this issue: Affects: fedora-all [bug 1908864]
https://github.com/ceph/ceph/commit/1b8a634fdcd94dfb3ba650793fb1b6d09af65e05 https://github.com/ceph/ceph/commit/7e3e4e73783a98bb07ab399438eb3aab41a6fc8b Patches may be found here
Statement: Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time. Red Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of ceph package is no longer used and supported with the release of RHOCS 4.3. Red Hat Enterprise Linux ceph packages do not include the vulnerable component.
This issue has been addressed in the following products: Red Hat Ceph Storage 4.2 Via RHSA-2021:0081 https://access.redhat.com/errata/RHSA-2021:0081
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27781
This issue has been addressed in the following products: Red Hat Ceph Storage 3 - ELS Via RHSA-2021:1518 https://access.redhat.com/errata/RHSA-2021:1518