Package "rbd-mirror"
  
    
    
        | Name: | rbd-mirror | 
    
        | Description:
 | Ceph daemon for mirroring RBD images | 
    
        | Latest version: | 15.2.17-0ubuntu0.20.04.6 | 
    
        | Release: | focal (20.04) | 
    
        | Level: | security | 
    
        | Repository: | universe | 
         
            | Head package: | ceph | 
        
            | Homepage: | http://ceph.com/ | 
    
   
  
  
 
Links
    Download "rbd-mirror"
    
Other versions of "rbd-mirror" in Focal
    
Changelog
    
    
    
        
        
    
    
        |   ceph (15.2.17-0ubuntu0.20.04.6) focal-security; urgency=medium   * SECURITY UPDATE: Improper bucket validation in POST requests
- debian/patches/CVE-2023-43040.patch: rgw: Fix bucket validation against POST policies
 - CVE-2023-43040
  -- Nick Galanis <email address hidden>  Thu, 11 Jan 2024 12:26:21 +0000 | 
    | Source diff to previous version | 
        
        |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (15.2.17-0ubuntu0.20.04.3) focal-security; urgency=medium   * SECURITY UPDATE: privilege escalation via ceph crash service
- debian/patches/CVE-2022-3650-2.patch: fix some flake8 issues in
 src/ceph-crash.in.
 - debian/patches/CVE-2022-3650-3.patch: fix stderr handling in
 src/ceph-crash.in.
 - debian/patches/CVE-2022-3650-4.patch: drop privleges to run as "ceph"
 user, rather than root in src/ceph-crash.in.
 - debian/patches/CVE-2022-3650-5.patch: chown crash files to ceph user
 in qa/workunits/rados/test_crash.sh.
 - debian/patches/CVE-2022-3650-6.patch: log warning if crash directory
 unreadable in src/ceph-crash.in.
 - CVE-2022-3650
 * This also fixes CVE-2021-3979 and CVE-2022-0670 in the -security
 pocket.
  -- Marc Deslauriers <email address hidden>  Wed, 19 Apr 2023 19:05:07 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2022-3650 | A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump, |  
                | CVE-2021-3979 | A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algo |  
                | CVE-2022-0670 | A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file syste |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (15.2.12-0ubuntu0.20.04.1) focal-security; urgency=medium   * SECURITY UPDATE: New upstream release (LP: #1929179):
- CVE-2021-3509: Dashboard XSS via token cookie.
 - CVE-2021-3531: Swift API denial of service.
 - CVE-2021-3531: HTTP header injects via CORS in RGW.
  -- James Page <email address hidden>  Mon, 24 May 2021 16:07:20 +0100 | 
    | Source diff to previous version | 
        
        | 
                
                | 1929179 | [SRU] ceph 15.2.12 |  
                | CVE-2021-3509 | A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to a |  
                | CVE-2021-3531 | A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes |  | 
    
    
    
    
    
        
        
    
    
        |   ceph (15.2.7-0ubuntu0.20.04.2) focal-security; urgency=medium   * No-change rebuild in security pocket.
* SECURITY UPDATE: Authorization bypass vulnerability
 - CVE-2020-10736
 - CVE-2020-25660
 * SECURITY UPDATE: Code injection vulnerability
 - CVE-2020-10753
  -- Paulo Flabiano Smorigo <email address hidden>  Wed, 20 Jan 2021 19:09:07 +0000 | 
    
        
        | 
                
                | CVE-2020-10736 | An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restri |  
                | CVE-2020-25660 | A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly a |  
                | CVE-2020-10753 | A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates