]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/commit
libceph: bump CephXAuthenticate encoding version
authorIlya Dryomov <idryomov@gmail.com>
Wed, 14 Apr 2021 08:38:40 +0000 (10:38 +0200)
committerStefan Bader <stefan.bader@canonical.com>
Wed, 19 May 2021 08:31:53 +0000 (10:31 +0200)
commit209ad124c2e3c068e57217b4c17860a84c3d562b
tree6c3db57b7ecc36193f1c99d2ecc1a83facdaf887
parent536f4b8065de49a9d6dc7a6be5eb26d67b5d4a45
libceph: bump CephXAuthenticate encoding version

BugLink: https://bugs.launchpad.net/bugs/1928857
commit 7807dafda21a549403d922da98dde0ddfeb70d08 upstream.

A dummy v3 encoding (exactly the same as v2) was introduced so that
the monitors can distinguish broken clients that may not include their
auth ticket in CEPHX_GET_AUTH_SESSION_KEY request on reconnects, thus
failing to prove previous possession of their global_id (one part of
CVE-2021-20288).

The kernel client has always included its auth ticket, so it is
compatible with enforcing mode as is.  However we want to bump the
encoding version to avoid having to authenticate twice on the initial
connect -- all legacy (CephXAuthenticate < v3) are now forced do so in
order to expose insecure global_id reclaim.

Marking for stable since at least for 5.11 and 5.12 it is trivial
(v2 -> v3).

Cc: stable@vger.kernel.org # 5.11+
URL: https://tracker.ceph.com/issues/50452
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Reviewed-by: Sage Weil <sage@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Stefan Bader <stefan.bader@canonical.com>
net/ceph/auth_x.c