Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in ceph
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in ceph
ID: SUSE-SU-2021:1108-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Enterprise Storage 7
Datum: Do, 8. April 2021, 22:43
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839
Applikationen: Ceph

Originalnachricht


SUSE Security Update: Security update for ceph
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1108-1
Rating: moderate
References: #1172926 #1176390 #1176489 #1176679 #1176828
#1177360 #1177857 #1178837 #1178860 #1178905
#1178932 #1179569 #1179997 #1182766
Cross-References: CVE-2020-25678 CVE-2020-27839
CVSS scores:
CVE-2020-25678 (NVD) : 4.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVE-2020-27839 (SUSE): 4
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:
SUSE Linux Enterprise Module for Basesystem 15-SP2
SUSE Enterprise Storage 7
______________________________________________________________________________

An update that solves two vulnerabilities and has 12 fixes
is now available.

Description:

This update for ceph fixes the following issues:

- ceph was updated to to 15.2.9
- cephadm: fix 'inspect' and 'pull' (bsc#1182766)
- CVE-2020-27839: mgr/dashboard: Use secure cookies to store JWT Token
(bsc#1179997)
- CVE-2020-25678: Do not add sensitive information in Ceph log files
(bsc#1178905)
- mgr/orchestrator: Sort 'ceph orch device ls' by host (bsc#1172926)
- mgr/dashboard: enable different URL for users of browser to Grafana
(bsc#1176390, bsc#1176679)
- mgr/cephadm: lock multithreaded access to OSDRemovalQueue (bsc#1176489)
- cephadm: command_unit: call systemctl with verbose=True (bsc#1176828)
- cephadm: silence "Failed to evict container" log msg (bsc#1177360)
- mgr/cephadm: upgrade: fail gracefully, if daemon redeploy fails
(bsc#1177857)
- rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
- mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
- cephadm: reference the last local image by digest (bsc#1178932,
bsc#1179569)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Basesystem 15-SP2:

zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1108=1

- SUSE Enterprise Storage 7:

zypper in -t patch SUSE-Storage-7-2021-1108=1



Package List:

- SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):

ceph-common-15.2.9.83+g4275378de0-3.17.1
ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-debugsource-15.2.9.83+g4275378de0-3.17.1
libcephfs-devel-15.2.9.83+g4275378de0-3.17.1
libcephfs2-15.2.9.83+g4275378de0-3.17.1
libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados-devel-15.2.9.83+g4275378de0-3.17.1
librados-devel-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados2-15.2.9.83+g4275378de0-3.17.1
librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1
libradospp-devel-15.2.9.83+g4275378de0-3.17.1
librbd-devel-15.2.9.83+g4275378de0-3.17.1
librbd1-15.2.9.83+g4275378de0-3.17.1
librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1
librgw-devel-15.2.9.83+g4275378de0-3.17.1
librgw2-15.2.9.83+g4275378de0-3.17.1
librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1
python3-ceph-common-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rados-15.2.9.83+g4275378de0-3.17.1
python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rbd-15.2.9.83+g4275378de0-3.17.1
python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rgw-15.2.9.83+g4275378de0-3.17.1
python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1
rados-objclass-devel-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1

- SUSE Enterprise Storage 7 (aarch64 x86_64):

ceph-base-15.2.9.83+g4275378de0-3.17.1
ceph-base-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-common-15.2.9.83+g4275378de0-3.17.1
ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-debugsource-15.2.9.83+g4275378de0-3.17.1
libcephfs2-15.2.9.83+g4275378de0-3.17.1
libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados2-15.2.9.83+g4275378de0-3.17.1
librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librbd1-15.2.9.83+g4275378de0-3.17.1
librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1
librgw2-15.2.9.83+g4275378de0-3.17.1
librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1
python3-ceph-common-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rados-15.2.9.83+g4275378de0-3.17.1
python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rbd-15.2.9.83+g4275378de0-3.17.1
python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rgw-15.2.9.83+g4275378de0-3.17.1
python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1

- SUSE Enterprise Storage 7 (noarch):

cephadm-15.2.9.83+g4275378de0-3.17.1


References:

https://www.suse.com/security/cve/CVE-2020-25678.html
https://www.suse.com/security/cve/CVE-2020-27839.html
https://bugzilla.suse.com/1172926
https://bugzilla.suse.com/1176390
https://bugzilla.suse.com/1176489
https://bugzilla.suse.com/1176679
https://bugzilla.suse.com/1176828
https://bugzilla.suse.com/1177360
https://bugzilla.suse.com/1177857
https://bugzilla.suse.com/1178837
https://bugzilla.suse.com/1178860
https://bugzilla.suse.com/1178905
https://bugzilla.suse.com/1178932
https://bugzilla.suse.com/1179569
https://bugzilla.suse.com/1179997
https://bugzilla.suse.com/1182766
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung