SUSE-SU-2021:1108-1: moderate: Security update for ceph
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Apr 8 13:17:30 UTC 2021
SUSE Security Update: Security update for ceph
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:1108-1
Rating: moderate
References: #1172926 #1176390 #1176489 #1176679 #1176828
#1177360 #1177857 #1178837 #1178860 #1178905
#1178932 #1179569 #1179997 #1182766
Cross-References: CVE-2020-25678 CVE-2020-27839
CVSS scores:
CVE-2020-25678 (NVD) : 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVE-2020-27839 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
SUSE Linux Enterprise Module for Basesystem 15-SP2
SUSE Enterprise Storage 7
______________________________________________________________________________
An update that solves two vulnerabilities and has 12 fixes
is now available.
Description:
This update for ceph fixes the following issues:
- ceph was updated to to 15.2.9
- cephadm: fix 'inspect' and 'pull' (bsc#1182766)
- CVE-2020-27839: mgr/dashboard: Use secure cookies to store JWT Token
(bsc#1179997)
- CVE-2020-25678: Do not add sensitive information in Ceph log files
(bsc#1178905)
- mgr/orchestrator: Sort 'ceph orch device ls' by host (bsc#1172926)
- mgr/dashboard: enable different URL for users of browser to Grafana
(bsc#1176390, bsc#1176679)
- mgr/cephadm: lock multithreaded access to OSDRemovalQueue (bsc#1176489)
- cephadm: command_unit: call systemctl with verbose=True (bsc#1176828)
- cephadm: silence "Failed to evict container" log msg (bsc#1177360)
- mgr/cephadm: upgrade: fail gracefully, if daemon redeploy fails
(bsc#1177857)
- rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
- mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
- cephadm: reference the last local image by digest (bsc#1178932,
bsc#1179569)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1108=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2021-1108=1
Package List:
- SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):
ceph-common-15.2.9.83+g4275378de0-3.17.1
ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-debugsource-15.2.9.83+g4275378de0-3.17.1
libcephfs-devel-15.2.9.83+g4275378de0-3.17.1
libcephfs2-15.2.9.83+g4275378de0-3.17.1
libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados-devel-15.2.9.83+g4275378de0-3.17.1
librados-devel-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados2-15.2.9.83+g4275378de0-3.17.1
librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1
libradospp-devel-15.2.9.83+g4275378de0-3.17.1
librbd-devel-15.2.9.83+g4275378de0-3.17.1
librbd1-15.2.9.83+g4275378de0-3.17.1
librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1
librgw-devel-15.2.9.83+g4275378de0-3.17.1
librgw2-15.2.9.83+g4275378de0-3.17.1
librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1
python3-ceph-common-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rados-15.2.9.83+g4275378de0-3.17.1
python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rbd-15.2.9.83+g4275378de0-3.17.1
python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rgw-15.2.9.83+g4275378de0-3.17.1
python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1
rados-objclass-devel-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
ceph-base-15.2.9.83+g4275378de0-3.17.1
ceph-base-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-common-15.2.9.83+g4275378de0-3.17.1
ceph-common-debuginfo-15.2.9.83+g4275378de0-3.17.1
ceph-debugsource-15.2.9.83+g4275378de0-3.17.1
libcephfs2-15.2.9.83+g4275378de0-3.17.1
libcephfs2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librados2-15.2.9.83+g4275378de0-3.17.1
librados2-debuginfo-15.2.9.83+g4275378de0-3.17.1
librbd1-15.2.9.83+g4275378de0-3.17.1
librbd1-debuginfo-15.2.9.83+g4275378de0-3.17.1
librgw2-15.2.9.83+g4275378de0-3.17.1
librgw2-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1
python3-ceph-common-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-15.2.9.83+g4275378de0-3.17.1
python3-cephfs-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rados-15.2.9.83+g4275378de0-3.17.1
python3-rados-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rbd-15.2.9.83+g4275378de0-3.17.1
python3-rbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
python3-rgw-15.2.9.83+g4275378de0-3.17.1
python3-rgw-debuginfo-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-15.2.9.83+g4275378de0-3.17.1
rbd-nbd-debuginfo-15.2.9.83+g4275378de0-3.17.1
- SUSE Enterprise Storage 7 (noarch):
cephadm-15.2.9.83+g4275378de0-3.17.1
References:
https://www.suse.com/security/cve/CVE-2020-25678.html
https://www.suse.com/security/cve/CVE-2020-27839.html
https://bugzilla.suse.com/1172926
https://bugzilla.suse.com/1176390
https://bugzilla.suse.com/1176489
https://bugzilla.suse.com/1176679
https://bugzilla.suse.com/1176828
https://bugzilla.suse.com/1177360
https://bugzilla.suse.com/1177857
https://bugzilla.suse.com/1178837
https://bugzilla.suse.com/1178860
https://bugzilla.suse.com/1178905
https://bugzilla.suse.com/1178932
https://bugzilla.suse.com/1179569
https://bugzilla.suse.com/1179997
https://bugzilla.suse.com/1182766
More information about the sle-updates
mailing list