CVE-2024-48916
Publication date 3 December 2024
Last updated 4 August 2025
Ubuntu priority
Cvss 3 Severity Score
Ceph is a distributed object, block, and file storage platform. In versions 19.2.3 and below, it is possible to send an JWT that has "none" as JWT alg. And by doing so the JWT signature is not checked. The vulnerability is most likely in the RadosGW OIDC provider. As of time of publication, a known patched version has yet to be published.
Status
Package | Ubuntu Release | Status |
---|---|---|
ceph | 25.04 plucky |
Fixed 19.2.0-0ubuntu6
|
24.04 LTS noble |
Fixed 19.2.0-0ubuntu0.24.04.2
|
|
22.04 LTS jammy |
Fixed 17.2.7-0ubuntu0.22.04.2
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
mdeslaur
Per Debian, was introduced by the following commit in 16.1.0: https://github.com/ceph/ceph/commit/7566664f89be062e0c9f3519dc60b94c8af5e2a4
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7182-1
- Ceph vulnerability
- 6 January 2025