Name | CVE-2025-52555 |
Description | Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1108410 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ceph (PTS) | bullseye | 14.2.21-1 | vulnerable |
bookworm, bookworm (security) | 16.2.15+ds-0+deb12u1 | vulnerable | |
sid, trixie | 18.2.7-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ceph | source | (unstable) | (unfixed) | 1108410 |
https://bugzilla.redhat.com/show_bug.cgi?id=2374412
https://www.openwall.com/lists/oss-security/2025/06/26/1
https://github.com/ceph/ceph/pull/60314
https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm