Bugzilla – Bug 920926
VUL-0: CVE-2015-3010: ceph-deploy: keyring permissions are world readable in ~ceph
Last modified: 2016-04-27 18:22:29 UTC
After execution of ceph-deploy, ~ceph/ceph.client.admin.keyring has mode 644 owned by ceph:users. The Key is a pre-shared key matching the one in /etc/ceph/ceph.clkient.admin.keyring on each non-admin node. The attack scenario here is obviously if the user follows the documented ceph-deploy procedure by creating a dedicated admin user, he will create keys readable to all other (non-admin) users as well, thus leaking authentication credentials. Could you check if this is an issue?
I have made a simple patch for us. Sadly patch does not cleanly apply to upstream but the code logic is unchanged.
Made upstream pull request. https://github.com/ceph/ceph-deploy/pull/266 Also resolved in storage 1:0 release.
Done
Upstream commit: https://github.com/ceph/ceph-deploy/commit/eee56770393bf19ed2dd5389226c6190c08dee3f
Closed
bug 933028 (CVE-2015-4053) came up and should be added to this update.
Upstream merged Owen's patch in https://github.com/ceph/ceph-deploy/pull/272
SUSE-SU-2015:1102-1: An update that solves three vulnerabilities and has 12 fixes is now available. Category: security (moderate) Bug References: 889053,903007,907510,915567,915783,919091,919313,919965,920926,924269,924894,927862,929553,929886,929914 CVE References: CVE-2014-3589,CVE-2014-3598,CVE-2015-3010 Sources used: SUSE Enterprise Storage 1.0 (src): calamari-clients-1.2.2+git.1428648634.40dfe5b-3.1, ceph-0.80.9-5.1, ceph-deploy-1.5.19+git.1431355031.6178cf3-9.1, python-Pillow-2.7.0-4.1, python-djangorestframework-2.3.12-4.2
released