SUSE-SU-2022:2817-1: important: Security update for ceph
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Aug 16 13:22:51 UTC 2022
SUSE Security Update: Security update for ceph
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2817-1
Rating: important
References: #1194131 #1194875 #1195359 #1196044 #1196733
#1196785 #1200064 #1200553 SES-2515
Cross-References: CVE-2021-3979
CVSS scores:
CVE-2021-3979 (SUSE): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7.1
______________________________________________________________________________
An update that solves one vulnerability, contains one
feature and has 7 fixes is now available.
Description:
This update for ceph fixes the following issues:
- Update to 16.2.9-536-g41a9f9a5573:
+ (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in
RGWRadosBILogTrimCR
+ (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option
(CVE-2021-3979)
- Update to 16.2.9-158-gd93952c7eea:
+ cmake: check for python(\d)\.(\d+) when building boost
+ make-dist: patch boost source to support python 3.10
- Update to ceph-16.2.9-58-ge2e5cb80063:
+ (bsc#1200064, pr#480) Remove last vestiges of docker.io image paths
- Update to 16.2.9.50-g7d9f12156fb:
+ (jsc#SES-2515) High-availability NFS export
+ (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only
using hostname
+ (bsc#1196785) cephadm: avoid crashing on expected non-zero exit
- Update to 16.2.7-969-g6195a460d89
+ (jsc#SES-2515) High-availability NFS export
- Update to v16.2.7-654-gd5a90ff46f0
+ (bsc#1196733) remove build directory during %clean
- Update to v16.2.7-652-gf5dc462fdb5
+ (bsc#1194875) [SES7P] include/buffer: include memory
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2022-2817=1
Package List:
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
ceph-base-16.2.9.536+g41a9f9a5573-150300.3.3.1
ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.3.3.1
libcephfs2-16.2.9.536+g41a9f9a5573-150300.3.3.1
libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
librados2-16.2.9.536+g41a9f9a5573-150300.3.3.1
librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
librbd1-16.2.9.536+g41a9f9a5573-150300.3.3.1
librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
librgw2-16.2.9.536+g41a9f9a5573-150300.3.3.1
librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-cephfs-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rados-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rgw-16.2.9.536+g41a9f9a5573-150300.3.3.1
python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
rbd-nbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- SUSE Enterprise Storage 7.1 (noarch):
cephadm-16.2.9.536+g41a9f9a5573-150300.3.3.1
References:
https://www.suse.com/security/cve/CVE-2021-3979.html
https://bugzilla.suse.com/1194131
https://bugzilla.suse.com/1194875
https://bugzilla.suse.com/1195359
https://bugzilla.suse.com/1196044
https://bugzilla.suse.com/1196733
https://bugzilla.suse.com/1196785
https://bugzilla.suse.com/1200064
https://bugzilla.suse.com/1200553
More information about the sle-security-updates
mailing list