Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ceph
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ceph
ID: SUSE-SU-2018:2299-1
Distribution: SUSE
Plattformen: SUSE Enterprise Storage 4
Datum: Fr, 10. August 2018, 23:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7262
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
Applikationen: Ceph

Originalnachricht

   SUSE Security Update: Security update for ceph
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:2299-1
Rating: important
References: #1072512 #1080112 #1081379 #1086340 #1096748
#1099162
Cross-References: CVE-2018-10861 CVE-2018-1128 CVE-2018-1129
CVE-2018-7262
Affected Products:
SUSE Enterprise Storage 4
______________________________________________________________________________

An update that solves four vulnerabilities and has two
fixes is now available.

Description:

This update for ceph fixes the following issues:

Security issues fixed:

- CVE-2018-10861: Fix ceph-mon authorization on OSD pool ops (bsc#1099162).
- CVE-2018-1128: Fix cephx signature check bypass (bsc#1096748).
- CVE-2018-1129: Fix cephx protocol vulnerability to replay attack
(bsc#1096748).
- CVE-2018-7262: Fix malformed http headers that can crash rgw
(bsc#1081379).

Bug fixes:

- bsc#1072512: multipart uploads are broken if the bucket has been
resharded
- bsc#1080112: rgw: user stats increased after bucket reshard
- bsc#1086340: SES5: XFS metadata corruption on rbd-nbd mapped image with
journaling feature enabled


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Enterprise Storage 4:

zypper in -t patch SUSE-Storage-4-2018-1537=1



Package List:

- SUSE Enterprise Storage 4 (aarch64 x86_64):

ceph-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-base-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-base-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-common-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-common-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-debugsource-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-fuse-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-fuse-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-mds-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-mds-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-mon-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-mon-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-osd-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-osd-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-radosgw-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-radosgw-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-test-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-test-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
ceph-test-debugsource-10.2.11+git.1531487710.3a12911a2e-12.14.2
libcephfs1-10.2.11+git.1531487710.3a12911a2e-12.14.2
libcephfs1-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
librados2-10.2.11+git.1531487710.3a12911a2e-12.14.2
librados2-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
libradosstriper1-10.2.11+git.1531487710.3a12911a2e-12.14.2
libradosstriper1-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
librbd1-10.2.11+git.1531487710.3a12911a2e-12.14.2
librbd1-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
librgw2-10.2.11+git.1531487710.3a12911a2e-12.14.2
librgw2-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-ceph-compat-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-cephfs-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-cephfs-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-rados-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-rados-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-rbd-10.2.11+git.1531487710.3a12911a2e-12.14.2
python-rbd-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-fuse-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-fuse-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-mirror-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-mirror-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-nbd-10.2.11+git.1531487710.3a12911a2e-12.14.2
rbd-nbd-debuginfo-10.2.11+git.1531487710.3a12911a2e-12.14.2


References:

https://www.suse.com/security/cve/CVE-2018-10861.html
https://www.suse.com/security/cve/CVE-2018-1128.html
https://www.suse.com/security/cve/CVE-2018-1129.html
https://www.suse.com/security/cve/CVE-2018-7262.html
https://bugzilla.suse.com/1072512
https://bugzilla.suse.com/1080112
https://bugzilla.suse.com/1081379
https://bugzilla.suse.com/1086340
https://bugzilla.suse.com/1096748
https://bugzilla.suse.com/1099162

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung