{"id":"USN-7706-1","summary":"ceph vulnerabilities","details":"It was discovered that Ceph incorrectly handled read-only permissions. An\nauthenticated attacker could use this issue to obtain dm-crypt encryption\nkeys. This issue only affected Ubuntu 14.04 LTS. (CVE-2018-14662)\n\nSergey Bobrov discovered that Ceph’s RadosGW (Ceph Object Gateway) allowed\nthe injection of HTTP headers in responses to CORS requests. An attacker\ncould possibly use this issue to compromise system integrity. This issue\nonly\naffected Ubuntu 16.04 LTS. (CVE-2021-3524)","modified":"2026-02-10T04:49:48Z","published":"2025-08-20T05:36:40Z","related":["UBUNTU-CVE-2018-14662","UBUNTU-CVE-2021-3524"],"upstream":["CVE-2018-14662","CVE-2021-3524","UBUNTU-CVE-2018-14662","UBUNTU-CVE-2021-3524"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7706-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14662"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3524"}],"affected":[{"package":{"name":"ceph","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/ceph@0.80.11-0ubuntu1.14.04.4+esm3?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.80.11-0ubuntu1.14.04.4+esm3"}]}],"versions":["0.67.4-0ubuntu2","0.67.4-0ubuntu3","0.72-0ubuntu1","0.72.1-0ubuntu1","0.72.1-2","0.72.1-3","0.72.2-1","0.72.2-2","0.78-0ubuntu1","0.79-0ubuntu1","0.80.1-0ubuntu1","0.80.1-0ubuntu1.1","0.80.5-0ubuntu0.14.04.1","0.80.7-0ubuntu0.14.04.1","0.80.9-0ubuntu0.14.04.1","0.80.9-0ubuntu0.14.04.2","0.80.10-0ubuntu0.14.04.1","0.80.10-0ubuntu1.14.04.2","0.80.10-0ubuntu1.14.04.3","0.80.11-0ubuntu1.14.04.1","0.80.11-0ubuntu1.14.04.2","0.80.11-0ubuntu1.14.04.3","0.80.11-0ubuntu1.14.04.4","0.80.11-0ubuntu1.14.04.4+esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"ceph","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-common","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-fs-common","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-fuse","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-mds","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-resource-agents","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"ceph-test","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"libcephfs-dev","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"libcephfs-java","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"libcephfs-jni","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"libcephfs1","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"librados-dev","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"librados2","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"librbd-dev","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"librbd1","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"python-ceph","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"radosgw","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"rbd-fuse","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"},{"binary_name":"rest-bench","binary_version":"0.80.11-0ubuntu1.14.04.4+esm3"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-14662"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7706-1.json"}},{"package":{"name":"ceph","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ceph@10.2.11-0ubuntu0.16.04.3+esm2?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10.2.11-0ubuntu0.16.04.3+esm2"}]}],"versions":["0.94.3-0ubuntu2","0.94.5-0ubuntu1","9.2.0-0ubuntu3","9.2.0-0ubuntu4","9.2.0-0ubuntu5","9.2.0-0ubuntu6","10.0.2-0ubuntu1","10.0.3-0ubuntu1","10.0.5-0ubuntu1","10.1.0-0ubuntu1","10.1.1-0ubuntu1","10.1.2-0ubuntu1","10.2.0-0ubuntu0.16.04.1","10.2.0-0ubuntu0.16.04.2","10.2.2-0ubuntu0.16.04.2","10.2.3-0ubuntu0.16.04.2","10.2.5-0ubuntu0.16.04.1","10.2.6-0ubuntu0.16.04.1","10.2.7-0ubuntu0.16.04.1","10.2.9-0ubuntu0.16.04.1","10.2.10-0ubuntu0.16.04.1","10.2.11-0ubuntu0.16.04.1","10.2.11-0ubuntu0.16.04.2","10.2.11-0ubuntu0.16.04.3","10.2.11-0ubuntu0.16.04.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"ceph","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-common","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-fs-common","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-fuse","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-mds","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-resource-agents","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"ceph-test","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libcephfs-dev","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libcephfs-java","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libcephfs-jni","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libcephfs1","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librados-dev","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librados2","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libradosstriper-dev","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"libradosstriper1","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librbd-dev","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librbd1","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librgw-dev","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"librgw2","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"python-ceph","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"python-cephfs","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"python-rados","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"python-rbd","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"radosgw","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"rbd-fuse","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"rbd-mirror","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"},{"binary_name":"rbd-nbd","binary_version":"10.2.11-0ubuntu0.16.04.3+esm2"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-3524"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7706-1.json"}}],"schema_version":"1.7.3"}