<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0014</id>
    <title>An update for ceph is now available for HCE 2.0</title>
    <severity>Moderate</severity>
    <release>HCE 2.0</release>
    <issued date="2024-01-03 03:35:57"/>
    <updated date="2024-01-03 03:35:57"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-43040" id="CVE-2023-43040" title="CVE-2023-43040 Base Score: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-3854" id="CVE-2022-3854" title="CVE-2022-3854 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in rgw. This flaw allows an unprivileged user to write to any bucket(s) accessible by a given key if a POST's form-data contains a key called 'bucket' with a value matching the bucket's name used to sign the request. This issue results in a user being able to upload to any bucket accessible by the specified access key as long as the bucket in the POST policy matches the bucket in the said POST form part. (CVE-2023-43040)

A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service. (CVE-2022-3854)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="ceph">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="librados2" version="16.2.7" release="18.hce2">
          <filename>librados2-16.2.7-18.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="librbd1" version="16.2.7" release="18.hce2">
          <filename>librbd1-16.2.7-18.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="librados2" version="16.2.7" release="18.hce2">
          <filename>librados2-16.2.7-18.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="librbd1" version="16.2.7" release="18.hce2">
          <filename>librbd1-16.2.7-18.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
