SUSE-SU-2021:1472-1: important: Security update for ceph, deepsea

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue May 4 10:25:16 UTC 2021


   SUSE Security Update: Security update for ceph, deepsea
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:1472-1
Rating:             important
References:         #1145463 #1174466 #1177200 #1178016 #1178216 
                    #1178235 #1178657 #1178837 #1178860 #1178905 
                    #1179997 #1180118 #1180594 #1181183 #1181378 
                    #1181665 #1183074 #1183487 #1183600 
Cross-References:   CVE-2020-25678 CVE-2020-27839 CVE-2021-20288
                   
CVSS scores:
                    CVE-2020-25678 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
                    CVE-2020-27839 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-20288 (NVD) : 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-20288 (SUSE): 8 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Affected Products:
                    SUSE Enterprise Storage 6
______________________________________________________________________________

   An update that solves three vulnerabilities and has 16
   fixes is now available.

Description:

   This update for ceph, deepsea fixes the following issues:

   - ceph was updated to 14.2.20-402-g6aa76c6815:
       * CVE-2021-20288: Fixed unauthorized global_id reuse (bsc#1183074).
       * CVE-2020-25678: Do not add sensitive information in Ceph log files
         (bsc#1178905).
       * CVE-2020-27839: Use secure cookies to store JWT Token (bsc#1179997).
       * mgr/dashboard: prometheus alerting: add some leeway for package
         drops and errors (bsc#1145463)
       * mon: have 'mon stat' output json as well (bsc#1174466)
       * rpm: ceph-mgr-dashboard recommends python3-saml on SUSE (bsc#1177200)
       * mgr/dashboard: Display a warning message in Dashboard when debug
         mode is enabled (bsc#1178235)
       * rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
       * mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
       * bluestore: provide a different name for fallback allocator
         (bsc#1180118)
       * test/run-cli-tests: use cram from github (bsc#1181378)
       * mgr/dashboard: fix "Python2 Cookie module import fails on Python3"
         (bsc#1183487)
       * common: make ms_bind_msgr2 default to 'false' (bsc#1180594)

   - deapsea was updated to 0.9.35
       * osd: add method to zap simple osds (bsc#1178657, bsc#1178216)
       * upgrade to cephadm: fix Drive Group generation (bsc#1181665)
       * Rework config change detection to handle global.conf correctly
         (bsc#1181183)
       * Use -i to pass credentials to `ceph dashboard` commands (bsc#1183600)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Enterprise Storage 6:

      zypper in -t patch SUSE-Storage-6-2021-1472=1



Package List:

   - SUSE Enterprise Storage 6 (noarch):

      deepsea-0.9.35+git.0.5a1dc9fe-3.34.1
      deepsea-cli-0.9.35+git.0.5a1dc9fe-3.34.1


References:

   https://www.suse.com/security/cve/CVE-2020-25678.html
   https://www.suse.com/security/cve/CVE-2020-27839.html
   https://www.suse.com/security/cve/CVE-2021-20288.html
   https://bugzilla.suse.com/1145463
   https://bugzilla.suse.com/1174466
   https://bugzilla.suse.com/1177200
   https://bugzilla.suse.com/1178016
   https://bugzilla.suse.com/1178216
   https://bugzilla.suse.com/1178235
   https://bugzilla.suse.com/1178657
   https://bugzilla.suse.com/1178837
   https://bugzilla.suse.com/1178860
   https://bugzilla.suse.com/1178905
   https://bugzilla.suse.com/1179997
   https://bugzilla.suse.com/1180118
   https://bugzilla.suse.com/1180594
   https://bugzilla.suse.com/1181183
   https://bugzilla.suse.com/1181378
   https://bugzilla.suse.com/1181665
   https://bugzilla.suse.com/1183074
   https://bugzilla.suse.com/1183487
   https://bugzilla.suse.com/1183600



More information about the sle-updates mailing list