|
|
Message-ID: <CABBoStjA+zmXBWfGkP_Uf_suts0SB=AfEZdcbDj95Xdv3E7dpA@mail.gmail.com> Date: Wed, 21 Jan 2026 14:22:03 -0500 From: "Sage [They / Them] McTaggart" <amctagga@...hat.com> To: Martin Schobert <martin.schobert@...tagrid.ch>, oss-security@...ts.openwall.com Subject: CVE-2024-31884 Ceph: Incorrect usage of certificate checking via Pybind Hello all, We have a vulnerability to report for Ceph. Summary ======= A flaw was found in Ceph. An attacker can allow Ceph to accept any certificate because no certificate context is passed via Pybind to the constructors imaplib.IMAP4_SSL or smtplib.SMTP_SSL. As a result, pybind pybind does not check the server's X.509 certificate, instead accepting any certificate. This enables an attacker to commit a Man In the Middle (MITM) attack, compromising mail server credentials or mail contents Our Advisory: https://github.com/ceph/ceph/security/advisories/GHSA-xj9f-7g59-m4jx CVSS and CWE ============ We have assigned it a CVE of CVE-2024-31884 with a CVSS score of 6.5 aka CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N and a CWE of CWE-295 AKA Improper Certificate Validation Credits ====== Credits to: Martin Schobert Fixed in ====== IBM Storage Ceph 9.0 (To GA on Friday, 1/23/26) Fixed via following PRs in upstream with targeted releases. #66089 <https://github.com/ceph/ceph/pull/66089> 20.2.1 #66140 <https://github.com/ceph/ceph/pull/66140> 19.2.4 #66141 <https://github.com/ceph/ceph/pull/66141> 18.2.9 #66142 <https://github.com/ceph/ceph/pull/66142> Sage McTaggart IBM Product Security amct@...hat.com sagemct@....com
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.