QID 198554

Date Published: 2021-11-10

QID 198554: Ubuntu Security Notification for Ceph Vulnerabilities (USN-5128-1)

User credentials in ceph could be manipulated in certain environments.
Ceph contained an authentication flaw, leading to key reuse.
The ceph dashboard was susceptible to a cross-site scripting attack.
Ceph's radosgw (ceph object gateway) allowed the injection of http headers in responses to cors requests.
Ceph's radosgw (ceph object gateway) did not properly handle get requests for swift urls in some situations, leading to an application crash.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

an attacker could use this to gain unintended access to resources.
This issue only affected ubuntu 18.04 lts. (
Cve-2020-27781).
An attacker could use this to cause a denial of service or possibly impersonate another user.
This issue only affected ubuntu 21.04.
(cve-2021-20288).
An attacker could use this to expose sensitive information or gain unintended access.
This issue only affected ubuntu 21.04. (
Cve-2021-3509).
An attacker could use this to violate system integrity. (
Cve-2021-3524).
An attacker could use this to cause a denial of service. (
Cve-2021-3531).

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Refer to Ubuntu advisory: USN-5128-1 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-5128-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5128-1