Package "librbd-dev"
Name: |
librbd-dev
|
Description: |
RADOS block device client library (development files)
|
Latest version: |
12.2.13-0ubuntu0.18.04.11 |
Release: |
bionic (18.04) |
Level: |
security |
Repository: |
main |
Head package: |
ceph |
Homepage: |
http://ceph.com/ |
Links
Download "librbd-dev"
Other versions of "librbd-dev" in Bionic
Changelog
ceph (12.2.13-0ubuntu0.18.04.11) bionic-security; urgency=medium
* SECURITY UPDATE: non random key via key length flaw
- debian/patches/CVE-2021-3979.patch: honour osd_dmcrypt_key_size
option in src/ceph-volume/ceph_volume/tests/util/test_encryption.py,
src/ceph-volume/ceph_volume/util/encryption.py.
- CVE-2021-3979
-- Marc Deslauriers <email address hidden> Wed, 19 Apr 2023 11:37:58 -0400
|
Source diff to previous version |
CVE-2021-3979 |
A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algo |
|
ceph (12.2.13-0ubuntu0.18.04.10) bionic-security; urgency=medium
* SECURITY UPDATE: user credentials issue
- debian/patches/CVE-2020-27781-1.patch: fix PEP-8 SyntaxWarning in
src/pybind/ceph_volume_client.py.
- debian/patches/CVE-2020-27781-2.patch: disallow authorize auth_id in
src/pybind/ceph_volume_client.py.
- debian/patches/CVE-2020-27781-3.patch: preserve existing caps while
authorize/deauthorize auth-id in src/pybind/ceph_volume_client.py.
- debian/patches/CVE-2020-27781-4.patch: optionally authorize existing
auth-ids in src/pybind/ceph_volume_client.py.
- debian/patches/CVE-2020-27781-5.patch: add tests in
qa/tasks/cephfs/test_volume_client.py.
- CVE-2020-27781
* SECURITY UPDATE: HTTP headers injection
- debian/patches/CVE-2021-3524.patch: add more escaping to headers in
src/rgw/rgw_cors.cc.
- CVE-2021-3524
* SECURITY UPDATE: denial of service in rgw
- debian/patches/CVE-2021-3531.patch: checks empty subdir_name in
src/rgw/rgw_rest_swift.cc.
- CVE-2021-3531
* This package does _not_ contain the changes from the
12.2.13-0ubuntu0.18.04.9 package in bionic-proposed.
-- Marc Deslauriers <email address hidden> Fri, 24 Sep 2021 09:46:46 -0400
|
Source diff to previous version |
CVE-2020-27781 |
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open S |
CVE-2021-3524 |
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection |
CVE-2021-3531 |
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes |
|
ceph (12.2.13-0ubuntu0.18.04.4) bionic-security; urgency=medium
* SECURITY UPDATE: XSS attacks
- debian/patches/CVE-2020-1760-1.patch: reject unauthenticated
response-header actions in src/rgw/rgw_rest_s3.cc.
- debian/patches/CVE-2020-1760-2.patch: change EPERM to
ERR_INVALID_REQUEST in src/rgw/rgw_rest_s3.cc.
- debian/patches/CVE-2020-1760-3.patch: reject control characters in
response-header actions in src/rgw/rgw_rest_s3.cc.
- CVE-2020-1760
* SECURITY UPDATE: HTTP header injection
- debian/patches/CVE-2020-10753.patch: sanitize newlines in
src/rgw/rgw_cors.cc.
- CVE-2020-10753
* SECURITY UPDATE: DoS via invalid tagging XML
- debian/patches/CVE-2020-12059.patch: check for tagging element in
src/rgw/rgw_rest_s3.cc.
- CVE-2020-12059
-- Marc Deslauriers <email address hidden> Wed, 09 Sep 2020 08:51:41 -0400
|
Source diff to previous version |
CVE-2020-1760 |
header-splitting in RGW GetObject has a possible XSS |
CVE-2020-10753 |
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS |
CVE-2020-12059 |
An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exc |
|
ceph (12.2.12-0ubuntu0.18.04.5) bionic-security; urgency=medium
* SECURITY UPDATE: DoS via RGW Beast front-end unexpected disconnects
- debian/patches/CVE-2020-1700.patch: avoid leaking connections in
src/rgw/rgw_asio_frontend.cc.
- CVE-2020-1700
-- Marc Deslauriers <email address hidden> Mon, 10 Feb 2020 11:12:03 -0500
|
Source diff to previous version |
CVE-2020-1700 |
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making mult |
|
ceph (12.2.12-0ubuntu0.18.04.2) bionic-security; urgency=medium
* SECURITY UPDATE: RADOS gateway remote denial of service
- d/p/CVE-2019-10222.patch: rgw: asio: check the remote endpoint
before processing requests.
- CVE-2019-10222
-- Steve Beattie <email address hidden> Tue, 27 Aug 2019 23:12:03 -0700
|
|
About
-
Send Feedback to @ubuntu_updates