Bug 13826

Summary: [CVE 21] ceph 15.2.7 CVEs found
Product: [ROSA-based products] ROSA Fresh Reporter: Yury <y.tumanov>
Component: System (kernel, glibc, systemd, bash, PAM...)Assignee: ROSA Linux Bugs <bugs>
Status: VERIFIED FIXED QA Contact: ROSA Linux Bugs <bugs>
Severity: blocker    
Priority: Highest CC: a.proklov, e.kosachev, m.novosyolov, pastordidi, s.matveev, temap, v.potapov, y.tumanov
Version: AllFlags: v.potapov: qa_verified+
y.tumanov: secteam_verified+
a.proklov: published+
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: CVE-2020-25678, CVE-2020-27781, CVE-2020-27839, CVE-2022-0670,
Whiteboard:
Platform: 2021.1 ROSA Vulnerability identifier:
RPM Package: ISO-related:
Bad POT generating: Upstream:

Description Yury 2023-10-18 20:24:31 MSK
Please patch CVEs for package ceph version 15.2.7
  
INFO (CVEs are): ceph 15.2.7
 cves found
CVE-2020-25678
Desc: A flaw was found in ceph in versions prior to 16.y.z where ceph stores mgr module passwords in clear text. This can be found by searching the mgr logs for grafana and dashboard, with passwords visible.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-25678
Severity: MEDIUM
CVE-2020-27781
Desc: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator. This flaw affects Ceph versions prior to 14.2.16, 15.x prior to 15.2.8, and 16.x prior to 16.2.0.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-27781
Severity: HIGH
CVE-2020-27839
Desc: A flaw was found in ceph-dashboard. The JSON Web Token (JWT) used for user authentication is stored by the frontend application in the browser’s localStorage which is potentially vulnerable to attackers via XSS attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
Link: https://nvd.nist.gov/vuln/detail/CVE-2020-27839
Severity: MEDIUM
CVE-2022-0670
Desc: A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file system. The vulnerability is due to a bug in the "volumes" plugin in Ceph Manager. This allows an attacker to compromise Confidentiality and Integrity of a file system. Fixed in RHCS 5.2 and Ceph 17.2.2.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-0670
Severity: CRITICAL
Comment 1 Vladimir Potapov 2023-10-20 11:40:14 MSK
*** Bug 13694 has been marked as a duplicate of this bug. ***
Comment 2 Vladimir Potapov 2023-10-20 11:40:34 MSK
*** Bug 13502 has been marked as a duplicate of this bug. ***
Comment 3 Aleksandr Proklov 2023-10-23 08:00:16 MSK
Уязвимости закрыты обновлением.

ceph-15.2.17-1

https://abf.io/build_lists/4760428 (x64)
https://abf.io/build_lists/4760416
Comment 4 Dmitry Postnikov 2023-10-25 09:55:49 MSK
*****************************
Обновление отослано в Тестинг
Comment 5 Mikhail Novosyolov 2023-10-26 12:02:18 MSK
 Проблема 1: package lib64rgw_admin_user1-15.2.7-3.x86_64 requires lib64rgw2 = 15.2.7-3, but none of the providers can be installed
  - cannot install both lib64rgw2-15.2.17-1.x86_64 and lib64rgw2-15.2.7-3.x86_64
  - cannot install both lib64rgw2-15.2.7-3.x86_64 and lib64rgw2-15.2.17-1.x86_64
  - cannot install the best update candidate for package lib64rgw_admin_user1-15.2.7-3.x86_64
  - cannot install the best update candidate for package lib64rgw2-15.2.7-3.x86_64
 Проблема 2: problem with installed package lib64rgw_admin_user1-15.2.7-3.x86_64
  - package lib64rgw_admin_user1-15.2.7-3.x86_64 requires lib64rgw2 = 15.2.7-3, but none of the providers can be installed
  - cannot install both lib64rgw2-15.2.17-1.x86_64 and lib64rgw2-15.2.7-3.x86_64
  - cannot install both lib64rgw2-15.2.7-3.x86_64 and lib64rgw2-15.2.17-1.x86_64
  - package ceph-base-15.2.17-1.x86_64 requires lib64rgw2 = 15.2.17-1, but none of the providers can be installed
  - cannot install the best update candidate for package ceph-base-15.2.7-3.x86_64
(попробуйте добавить в командную строку «--allowerasing» для замены конфликтующих пакетов или «--skip-broken» для пропуска удаляемых пакетов или «--nobest», чтобы использовать не только наилучшие варианты пакетов)

Видимо, нужно прописать "Obsoletes: %{_lib}rgw_admin_user1 < 15.2.17" в {librgw}
Comment 6 Mikhail Novosyolov 2023-10-26 12:07:03 MSK
Проблема от того, похоже, что %{librgw_admin_user} и %{librgw} друг от друга зацикленно зависят.
Comment 7 Aleksandr Proklov 2023-10-26 12:32:55 MSK
ceph-15.2.17-1

- вставил Obsolete

https://abf.io/build_lists/4765067
https://abf.io/build_lists/4765068
Comment 8 Aleksandr Proklov 2023-10-26 12:33:15 MSK
ceph-15.2.17-2 т.е. релиз
Comment 9 Dmitry Postnikov 2023-10-26 14:43:44 MSK
*****************************
Обновление отослано в Тестинг
Comment 10 Vladimir Potapov 2023-11-01 16:29:54 MSK
Разве 
https://nvd.nist.gov/vuln/detail/CVE-2020-25678
закрывается этим обновлением? Там вроде только патч?
Comment 11 Aleksandr Proklov 2023-11-02 05:54:19 MSK
патч включен в новую версию за 3 года-то. да и нету там пача конкретного, я не вижу.
Comment 12 Vladimir Potapov 2023-11-02 06:46:27 MSK
(In reply to Aleksandr Proklov from comment #11)
> патч включен в новую версию за 3 года-то. да и нету там пача конкретного, я
> не вижу.

Ага, нашел что исправлено в 15.2.9
https://bodhi.fedoraproject.org/updates/FEDORA-2021-93ff9e9103
Comment 13 Vladimir Potapov 2023-11-02 06:47:45 MSK
ceph-15.2.17-2
https://abf.io/build_lists/4765067
https://abf.io/build_lists/4765068
************************* Advisory ***********************
CVE-2020-25678, CVE-2020-27781, CVE-2020-27839, CVE-2022-0670 fix
**********************************************************
QA Verified
Comment 14 Yury 2023-11-07 11:02:04 MSK
secteam_verified