SUSE-SU-2017:1479-1: moderate: Security update for ceph
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jun 2 10:10:18 MDT 2017
SUSE Security Update: Security update for ceph
______________________________________________________________________________
Announcement ID: SUSE-SU-2017:1479-1
Rating: moderate
References: #1003891 #1008435 #1008501 #1012100 #1014986
#1015748 #1029482 #970642
Cross-References: CVE-2016-9579
Affected Products:
SUSE Enterprise Storage 4
______________________________________________________________________________
An update that solves one vulnerability and has 7 fixes is
now available.
Description:
This update provides Ceph 10.2.6, which brings fixes and enhancements:
This security issue was fixed:
- CVE-2016-9579: Do not abort RGW server when accepting a CORS request
with short origin. (bsc#1014986)
These non-security issues were fixed:
- common: Add rdbmap to ceph-common. (bsc#1029482)
- tools/rados: Default to include clone objects when executing
"cache-flush-evict-all". (bsc#1003891)
- mon, ceph-disk: Add lockbox permissions to bootstrap-osd. (bsc#1008435)
- ceph_volume_client: Fix _recover_auth_meta() method. (bsc#1008501)
- systemd/ceph-disk: Reduce ceph-disk flock contention. (bsc#1012100)
- doc: Add verbiage to rbdmap manpage. (bsc#1015748)
- doc: Add Install section to systemd rbdmap.service file. (bsc#1015748)
- doc: Remove references to mds destroy from ceph-deploy man page.
(bsc#970642)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Enterprise Storage 4:
zypper in -t patch SUSE-Storage-4-2017-911=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Enterprise Storage 4 (aarch64 x86_64):
ceph-10.2.6+git.1490339825.57146d8-11.7
ceph-base-10.2.6+git.1490339825.57146d8-11.7
ceph-base-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-common-10.2.6+git.1490339825.57146d8-11.7
ceph-common-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-debugsource-10.2.6+git.1490339825.57146d8-11.7
ceph-fuse-10.2.6+git.1490339825.57146d8-11.7
ceph-fuse-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-mds-10.2.6+git.1490339825.57146d8-11.7
ceph-mds-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-mon-10.2.6+git.1490339825.57146d8-11.7
ceph-mon-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-osd-10.2.6+git.1490339825.57146d8-11.7
ceph-osd-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-radosgw-10.2.6+git.1490339825.57146d8-11.7
ceph-radosgw-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-test-10.2.6+git.1490339825.57146d8-11.7
ceph-test-debuginfo-10.2.6+git.1490339825.57146d8-11.7
ceph-test-debugsource-10.2.6+git.1490339825.57146d8-11.7
libcephfs1-10.2.6+git.1490339825.57146d8-11.7
libcephfs1-debuginfo-10.2.6+git.1490339825.57146d8-11.7
librados2-10.2.6+git.1490339825.57146d8-11.7
librados2-debuginfo-10.2.6+git.1490339825.57146d8-11.7
libradosstriper1-10.2.6+git.1490339825.57146d8-11.7
libradosstriper1-debuginfo-10.2.6+git.1490339825.57146d8-11.7
librbd1-10.2.6+git.1490339825.57146d8-11.7
librbd1-debuginfo-10.2.6+git.1490339825.57146d8-11.7
librgw2-10.2.6+git.1490339825.57146d8-11.7
librgw2-debuginfo-10.2.6+git.1490339825.57146d8-11.7
python-ceph-compat-10.2.6+git.1490339825.57146d8-11.7
python-cephfs-10.2.6+git.1490339825.57146d8-11.7
python-cephfs-debuginfo-10.2.6+git.1490339825.57146d8-11.7
python-rados-10.2.6+git.1490339825.57146d8-11.7
python-rados-debuginfo-10.2.6+git.1490339825.57146d8-11.7
python-rbd-10.2.6+git.1490339825.57146d8-11.7
python-rbd-debuginfo-10.2.6+git.1490339825.57146d8-11.7
rbd-fuse-10.2.6+git.1490339825.57146d8-11.7
rbd-fuse-debuginfo-10.2.6+git.1490339825.57146d8-11.7
rbd-mirror-10.2.6+git.1490339825.57146d8-11.7
rbd-mirror-debuginfo-10.2.6+git.1490339825.57146d8-11.7
rbd-nbd-10.2.6+git.1490339825.57146d8-11.7
rbd-nbd-debuginfo-10.2.6+git.1490339825.57146d8-11.7
References:
https://www.suse.com/security/cve/CVE-2016-9579.html
https://bugzilla.suse.com/1003891
https://bugzilla.suse.com/1008435
https://bugzilla.suse.com/1008501
https://bugzilla.suse.com/1012100
https://bugzilla.suse.com/1014986
https://bugzilla.suse.com/1015748
https://bugzilla.suse.com/1029482
https://bugzilla.suse.com/970642
More information about the sle-security-updates
mailing list