First published: Mon Jan 06 2025(Updated: )
It was discovered that Ceph incorrectly handled unsupported JWT algorithms in the RadosGW gateway. An attacker could possibly use this issue to bypass certain authentication checks and restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ceph | <19.2.0-0ubuntu2.1 | 19.2.0-0ubuntu2.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/ceph-base | <19.2.0-0ubuntu2.1 | 19.2.0-0ubuntu2.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/ceph-common | <19.2.0-0ubuntu2.1 | 19.2.0-0ubuntu2.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/radosgw | <19.2.0-0ubuntu2.1 | 19.2.0-0ubuntu2.1 |
Ubuntu Linux | =24.10 | |
All of | ||
ubuntu/ceph | <19.2.0-0ubuntu0.24.04.2 | 19.2.0-0ubuntu0.24.04.2 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/ceph-base | <19.2.0-0ubuntu0.24.04.2 | 19.2.0-0ubuntu0.24.04.2 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/ceph-common | <19.2.0-0ubuntu0.24.04.2 | 19.2.0-0ubuntu0.24.04.2 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/radosgw | <19.2.0-0ubuntu0.24.04.2 | 19.2.0-0ubuntu0.24.04.2 |
Ubuntu Linux | =24.04 | |
All of | ||
ubuntu/ceph | <17.2.7-0ubuntu0.22.04.2 | 17.2.7-0ubuntu0.22.04.2 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/ceph-base | <17.2.7-0ubuntu0.22.04.2 | 17.2.7-0ubuntu0.22.04.2 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/ceph-common | <17.2.7-0ubuntu0.22.04.2 | 17.2.7-0ubuntu0.22.04.2 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/radosgw | <17.2.7-0ubuntu0.22.04.2 | 17.2.7-0ubuntu0.22.04.2 |
Ubuntu Linux | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7182-1 discusses a vulnerability in Ceph that allows attackers to potentially bypass authentication checks due to incorrect handling of unsupported JWT algorithms.
USN-7182-1 affects Ceph versions prior to 19.2.0-0ubuntu2.1, among others in earlier releases.
To resolve the issue in USN-7182-1, upgrade to Ceph version 19.2.0-0ubuntu2.1 or later.
The USN-7182-1 vulnerability could lead to unauthorized access or actions within the Ceph RadosGW gateway.
There is no documented workaround for the USN-7182-1 vulnerability, and upgrading the software is recommended.