{"id":"USN-4528-1","summary":"ceph vulnerabilities","details":"Adam Mohammed discovered that Ceph incorrectly handled certain CORS\nExposeHeader tags. A remote attacker could possibly use this issue to\npreform an HTTP header injection attack. (CVE-2020-10753)\n\nLei Cao discovered that Ceph incorrectly handled certain POST requests with\ninvalid tagging XML. A remote attacker could possibly use this issue to\ncause Ceph to crash, leading to a denial of service. This issue only\naffected Ubuntu 18.04 LTS. (CVE-2020-12059)\n\nRobin H. Johnson discovered that Ceph incorrectly handled certain S3\nrequests. A remote attacker could possibly use this issue to perform a\nXSS attack. (CVE-2020-1760)\n","modified":"2026-04-22T10:08:15.935109Z","published":"2020-09-22T11:17:52Z","related":["UBUNTU-CVE-2020-10753","UBUNTU-CVE-2020-12059","UBUNTU-CVE-2020-1760"],"upstream":["CVE-2020-10753","CVE-2020-12059","CVE-2020-1760","UBUNTU-CVE-2020-10753","UBUNTU-CVE-2020-12059","UBUNTU-CVE-2020-1760"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4528-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-1760"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10753"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12059"}],"affected":[{"package":{"name":"ceph","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ceph@10.2.11-0ubuntu0.16.04.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.2.11-0ubuntu0.16.04.3"}]}],"versions":["0.94.3-0ubuntu2","0.94.5-0ubuntu1","9.2.0-0ubuntu3","9.2.0-0ubuntu4","9.2.0-0ubuntu5","9.2.0-0ubuntu6","10.0.2-0ubuntu1","10.0.3-0ubuntu1","10.0.5-0ubuntu1","10.1.0-0ubuntu1","10.1.1-0ubuntu1","10.1.2-0ubuntu1","10.2.0-0ubuntu0.16.04.1","10.2.0-0ubuntu0.16.04.2","10.2.2-0ubuntu0.16.04.2","10.2.3-0ubuntu0.16.04.2","10.2.5-0ubuntu0.16.04.1","10.2.6-0ubuntu0.16.04.1","10.2.7-0ubuntu0.16.04.1","10.2.9-0ubuntu0.16.04.1","10.2.10-0ubuntu0.16.04.1","10.2.11-0ubuntu0.16.04.1","10.2.11-0ubuntu0.16.04.2"],"ecosystem_specific":{"binaries":[{"binary_name":"ceph","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-common","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-fs-common","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-fuse","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-mds","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-resource-agents","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"ceph-test","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"libcephfs-java","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"libcephfs-jni","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"libcephfs1","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"librados2","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"libradosstriper1","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"librbd1","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"librgw2","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"python-ceph","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"python-cephfs","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"python-rados","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"python-rbd","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"radosgw","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"rbd-fuse","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"rbd-mirror","binary_version":"10.2.11-0ubuntu0.16.04.3"},{"binary_name":"rbd-nbd","binary_version":"10.2.11-0ubuntu0.16.04.3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4528-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2020-1760","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-10753","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"ceph","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ceph@12.2.13-0ubuntu0.18.04.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12.2.13-0ubuntu0.18.04.4"}]}],"versions":["12.2.0-0ubuntu1","12.2.1-0ubuntu1","12.2.2-0ubuntu1","12.2.2-0ubuntu2","12.2.4-0ubuntu1","12.2.4-0ubuntu1.1","12.2.7-0ubuntu0.18.04.1","12.2.8-0ubuntu0.18.04.1","12.2.8-0ubuntu0.18.04.2","12.2.11-0ubuntu0.18.04.1","12.2.11-0ubuntu0.18.04.2","12.2.12-0ubuntu0.18.04.1","12.2.12-0ubuntu0.18.04.2","12.2.12-0ubuntu0.18.04.3","12.2.12-0ubuntu0.18.04.4","12.2.12-0ubuntu0.18.04.5","12.2.13-0ubuntu0.18.04.2","12.2.13-0ubuntu0.18.04.3"],"ecosystem_specific":{"binaries":[{"binary_name":"ceph","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-base","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-common","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-fuse","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-mds","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-mgr","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-mon","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-osd","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-resource-agents","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"ceph-test","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"libcephfs-java","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"libcephfs-jni","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"libcephfs2","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"librados2","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"libradosstriper1","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"librbd1","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"librgw2","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python-ceph","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python-cephfs","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python-rados","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python-rbd","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python-rgw","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python3-ceph-argparse","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python3-cephfs","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python3-rados","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python3-rbd","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"python3-rgw","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"radosgw","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"rbd-fuse","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"rbd-mirror","binary_version":"12.2.13-0ubuntu0.18.04.4"},{"binary_name":"rbd-nbd","binary_version":"12.2.13-0ubuntu0.18.04.4"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4528-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"id":"CVE-2020-1760","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-10753","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12059","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.5"}