-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5825-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 06, 2024
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ceph
CVE ID : CVE-2023-43040 CVE-2024-48916
Sage McTaggart discovered an authentication bypass in radosgw, the RADOS
REST gateway of Ceph, a distributed storage and file system.
For the stable distribution (bookworm), these problems have been fixed in version 16.2.15+ds-0+deb12u1.
We recommend that you upgrade your ceph packages.
For the detailed security status of ceph please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ceph
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmdTS2cACgkQEMKTtsN8 Tjb+zBAAmcTwcz7ED6gZN7Yq8loxwkQmS+bdlXyEC2yUMl9i3n/+bOa0thCIWSz4 rcjPFGtVGuXh4nytBQuJyRyqbqUlw9yW/9I0UtOW/cZrZ/SkqSCKlKHjHIYphatT BWy7EVpwfwLCCvLrgiVKLYQ5aG47XKXmgIVpkK+r+mo4bEdmaRp4zeiMdDlmY9nO YOOv81PnpTcK8iMqTojEjN/85OfXrKVpX7/1F4CSoEHTT7fMRueQJ0SYjbD/QrCy ll8u5LsDXd8yFqUqzqf++nJ8HdBaczfK+Q+XSVRb/Qv400Scz0ARik/0wi8MdYTE /oFmIMrDgNryTl4CprxabRqIcCp/D/FGv/ER1VLZRR0I+0zLTeTHhSBjNTFNICPg kH5d2VBh9wdHbjKoHDTgDo9U3QNYykpNNpFbsvgkRqOP5mh7OhkKdqtgDHqZRyIW /ugF4VVGvB6Y009vHIe0ED38KI9e+m6VBbSxAdzRPOGVFCxnDxuJ2Sjdnj1z34j3 kmibOoId75AHHG5ODV8jQENdBHPkZcfqkpoeNMGYsyB46kpZyGTAUMUvyTY84ANj 6hsfmnEXFj/CtKjONh2Llc1LDHFplZJNtYZUg6gulCPQFY5SqeVHRWjMFbOt1Ds1 S136GefUHoaCOO2/gH5mIE1GdLCPu8ONCIcsAVCj6KGzFaRtlxI=
=6xl4
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)