Amazon Linux 2 Security Advisory: ALAS-2023-2297
Advisory Release Date: 2023-10-12 15:09 Pacific
Advisory Updated Date: 2023-10-19 23:40 Pacific
A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST's form-data contains a key called 'bucket' with a value matching the bucket's name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part. (CVE-2023-43040)
Affected Packages:
ceph-common
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update ceph-common to update your system.
aarch64:
ceph-common-10.2.5-4.amzn2.0.2.aarch64
librados2-10.2.5-4.amzn2.0.2.aarch64
librados2-devel-10.2.5-4.amzn2.0.2.aarch64
python-rados-10.2.5-4.amzn2.0.2.aarch64
librbd1-10.2.5-4.amzn2.0.2.aarch64
librbd1-devel-10.2.5-4.amzn2.0.2.aarch64
python-rbd-10.2.5-4.amzn2.0.2.aarch64
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.aarch64
i686:
ceph-common-10.2.5-4.amzn2.0.2.i686
librados2-10.2.5-4.amzn2.0.2.i686
librados2-devel-10.2.5-4.amzn2.0.2.i686
python-rados-10.2.5-4.amzn2.0.2.i686
librbd1-10.2.5-4.amzn2.0.2.i686
librbd1-devel-10.2.5-4.amzn2.0.2.i686
python-rbd-10.2.5-4.amzn2.0.2.i686
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.i686
src:
ceph-common-10.2.5-4.amzn2.0.2.src
x86_64:
ceph-common-10.2.5-4.amzn2.0.2.x86_64
librados2-10.2.5-4.amzn2.0.2.x86_64
librados2-devel-10.2.5-4.amzn2.0.2.x86_64
python-rados-10.2.5-4.amzn2.0.2.x86_64
librbd1-10.2.5-4.amzn2.0.2.x86_64
librbd1-devel-10.2.5-4.amzn2.0.2.x86_64
python-rbd-10.2.5-4.amzn2.0.2.x86_64
ceph-common-debuginfo-10.2.5-4.amzn2.0.2.x86_64