Zwei Probleme in ceph
ID: | SUSE-SU-2021:1108-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Enterprise Storage 7 |
Datum: | Do, 8. April 2021, 22:43 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839 |
Applikationen: | Ceph |
Originalnachricht |
|
SUSE Security Update: Security update for ceph ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:1108-1 Rating: moderate References: #1172926 #1176390 #1176489 #1176679 #1176828 #1177360 #1177857 #1178837 #1178860 #1178905 #1178932 #1179569 #1179997 #1182766 Cross-References: CVE-2020-25678 CVE-2020-27839 CVSS scores: CVE-2020-25678 (NVD) : 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVE-2020-27839 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: SUSE Linux Enterprise Module for Basesystem 15-SP2 SUSE Enterprise Storage 7 ______________________________________________________________________________ An update that solves two vulnerabilities and has 12 fixes is now available. Description: This update for ceph fixes the following issues: - ceph was updated to to 15.2.9 - cephadm: fix 'inspect' and 'pull' (bsc#1182766) - CVE-2020-27839: mgr/dashboard: Use secure cookies to store JWT Token (bsc#1179997) - CVE-2020-25678: Do not add sensitive information in Ceph log files (bsc#1178905) - mgr/orchestrator: Sort 'ceph orch device ls' by host (bsc#1172926) - mgr/dashboard: enable different URL for users of browser to Grafana (bsc#1176390, bsc#1176679) - mgr/cephadm: lock multithreaded access to OSDRemovalQueue (bsc#1176489) - cephadm: command_unit: call systemctl with verbose=True (bsc#1176828) - cephadm: silence "Failed to evict container" log msg (bsc#1177360) - mgr/cephadm: upgrade: fail gracefully, if daemon redeploy fails (bsc#1177857) - rgw: cls/user: set from_index for reset stats calls (bsc#1178837) - mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860) - cephadm: reference the last local image by digest (bsc#1178932, bsc#1179569) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1108=1 - SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2021-1108=1 Package List: - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): ceph-common-15.2.9.83+g4275378de0-3.17.1 ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1 ceph-debugsource-15.2.9.83+g4275378de0-3.17.1 libcephfs-devel-15.2.9.83+g4275378de0-3.17.1 libcephfs2-15.2.9.83+g4275378de0-3.17.1 libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1 librados-devel-15.2.9.83+g4275378de0-3.17.1 librados-devel-debuginfo-15.2.9.83+g4275378de0-3.17.1 librados2-15.2.9.83+g4275378de0-3.17.1 librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1 libradospp-devel-15.2.9.83+g4275378de0-3.17.1 librbd-devel-15.2.9.83+g4275378de0-3.17.1 librbd1-15.2.9.83+g4275378de0-3.17.1 librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1 librgw-devel-15.2.9.83+g4275378de0-3.17.1 librgw2-15.2.9.83+g4275378de0-3.17.1 librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1 python3-ceph-common-15.2.9.83+g4275378de0-3.17.1 python3-cephfs-15.2.9.83+g4275378de0-3.17.1 python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rados-15.2.9.83+g4275378de0-3.17.1 python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rbd-15.2.9.83+g4275378de0-3.17.1 python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rgw-15.2.9.83+g4275378de0-3.17.1 python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1 rados-objclass-devel-15.2.9.83+g4275378de0-3.17.1 rbd-nbd-15.2.9.83+g4275378de0-3.17.1 rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1 - SUSE Enterprise Storage 7 (aarch64 x86_64): ceph-base-15.2.9.83+g4275378de0-3.17.1 ceph-base-debuginfo-15.2.9.83+g4275378de0-3.17.1 ceph-common-15.2.9.83+g4275378de0-3.17.1 ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1 ceph-debugsource-15.2.9.83+g4275378de0-3.17.1 libcephfs2-15.2.9.83+g4275378de0-3.17.1 libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1 librados2-15.2.9.83+g4275378de0-3.17.1 librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1 librbd1-15.2.9.83+g4275378de0-3.17.1 librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1 librgw2-15.2.9.83+g4275378de0-3.17.1 librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1 python3-ceph-common-15.2.9.83+g4275378de0-3.17.1 python3-cephfs-15.2.9.83+g4275378de0-3.17.1 python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rados-15.2.9.83+g4275378de0-3.17.1 python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rbd-15.2.9.83+g4275378de0-3.17.1 python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1 python3-rgw-15.2.9.83+g4275378de0-3.17.1 python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1 rbd-nbd-15.2.9.83+g4275378de0-3.17.1 rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1 - SUSE Enterprise Storage 7 (noarch): cephadm-15.2.9.83+g4275378de0-3.17.1 References: https://www.suse.com/security/cve/CVE-2020-25678.html https://www.suse.com/security/cve/CVE-2020-27839.html https://bugzilla.suse.com/1172926 https://bugzilla.suse.com/1176390 https://bugzilla.suse.com/1176489 https://bugzilla.suse.com/1176679 https://bugzilla.suse.com/1176828 https://bugzilla.suse.com/1177360 https://bugzilla.suse.com/1177857 https://bugzilla.suse.com/1178837 https://bugzilla.suse.com/1178860 https://bugzilla.suse.com/1178905 https://bugzilla.suse.com/1178932 https://bugzilla.suse.com/1179569 https://bugzilla.suse.com/1179997 https://bugzilla.suse.com/1182766 |