{"id":"MGASA-2021-0207","summary":"Updated ceph packages fix a security vulnerability","details":"An authentication flaw was found in ceph. When the monitor handles\nCEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitize other_keys,\nallowing key reuse. An attacker who can request a global_id can exploit the\nability of any user to request a global_id previously associated with\nanother user, as ceph does not force the reuse of old keys to generate new\nones. The highest threat from this vulnerability is to data confidentiality\nand integrity as well as system availability (CVE-2021-20288).\n","modified":"2026-02-04T04:34:06.497714Z","published":"2021-05-07T05:35:41Z","related":["CVE-2021-20288"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0207.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28804"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2021/04/14/2"}],"affected":[{"package":{"name":"ceph","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/ceph?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.2.11-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0207.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}