Linux Security
Linux Security
Linux Security

openSUSE: 2021:0544-1 moderate: ceph

Date 12 Apr 2021
296
Posted By LinuxSecurity Advisories
An update that solves two vulnerabilities and has 12 fixes is now available.

   openSUSE Security Update: Security update for ceph
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0544-1
Rating:             moderate
References:         #1172926 #1176390 #1176489 #1176679 #1176828 
                    #1177360 #1177857 #1178837 #1178860 #1178905 
                    #1178932 #1179569 #1179997 #1182766 
Cross-References:   CVE-2020-25678 CVE-2020-27839
CVSS scores:
                    CVE-2020-25678 (NVD) : 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
                    CVE-2020-27839 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that solves two vulnerabilities and has 12 fixes
   is now available.

Description:

   This update for ceph fixes the following issues:

   - ceph was updated to to 15.2.9
   - cephadm: fix 'inspect' and 'pull' (bsc#1182766)
   - CVE-2020-27839: mgr/dashboard: Use secure cookies to store JWT Token
     (bsc#1179997)
   - CVE-2020-25678: Do not add sensitive information in Ceph log files
     (bsc#1178905)
   - mgr/orchestrator: Sort 'ceph orch device ls' by host (bsc#1172926)
   - mgr/dashboard: enable different URL for users of browser to Grafana
     (bsc#1176390, bsc#1176679)
   - mgr/cephadm: lock multithreaded access to OSDRemovalQueue (bsc#1176489)
   - cephadm: command_unit: call systemctl with verbose=True (bsc#1176828)
   - cephadm: silence "Failed to evict container" log msg (bsc#1177360)
   - mgr/cephadm: upgrade: fail gracefully, if daemon redeploy fails
     (bsc#1177857)
   - rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
   - mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
   - cephadm: reference the last local image by digest (bsc#1178932,
     bsc#1179569)

   This update was imported from the SUSE:SLE-15-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-544=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      ceph-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-base-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-base-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-common-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-debugsource-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-fuse-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-fuse-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-immutable-object-cache-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-immutable-object-cache-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mds-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mds-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mon-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mon-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-osd-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-osd-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-radosgw-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-radosgw-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-test-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-test-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-test-debugsource-15.2.9.83+g4275378de0-lp152.2.12.1
      cephfs-shell-15.2.9.83+g4275378de0-lp152.2.12.1
      libcephfs-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      libcephfs2-15.2.9.83+g4275378de0-lp152.2.12.1
      libcephfs2-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      librados-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      librados-devel-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      librados2-15.2.9.83+g4275378de0-lp152.2.12.1
      librados2-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      libradospp-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      librbd-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      librbd1-15.2.9.83+g4275378de0-lp152.2.12.1
      librbd1-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      librgw-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      librgw2-15.2.9.83+g4275378de0-lp152.2.12.1
      librgw2-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-ceph-argparse-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-ceph-common-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-cephfs-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-cephfs-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rados-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rados-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rbd-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rbd-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rgw-15.2.9.83+g4275378de0-lp152.2.12.1
      python3-rgw-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      rados-objclass-devel-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-fuse-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-fuse-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-mirror-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-mirror-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-nbd-15.2.9.83+g4275378de0-lp152.2.12.1
      rbd-nbd-debuginfo-15.2.9.83+g4275378de0-lp152.2.12.1

   - openSUSE Leap 15.2 (noarch):

      ceph-grafana-dashboards-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-cephadm-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-dashboard-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-diskprediction-cloud-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-diskprediction-local-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-k8sevents-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-modules-core-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-mgr-rook-15.2.9.83+g4275378de0-lp152.2.12.1
      ceph-prometheus-alerts-15.2.9.83+g4275378de0-lp152.2.12.1
      cephadm-15.2.9.83+g4275378de0-lp152.2.12.1


References:

   https://www.suse.com/security/cve/CVE-2020-25678.html
   https://www.suse.com/security/cve/CVE-2020-27839.html
   https://bugzilla.suse.com/1172926
   https://bugzilla.suse.com/1176390
   https://bugzilla.suse.com/1176489
   https://bugzilla.suse.com/1176679
   https://bugzilla.suse.com/1176828
   https://bugzilla.suse.com/1177360
   https://bugzilla.suse.com/1177857
   https://bugzilla.suse.com/1178837
   https://bugzilla.suse.com/1178860
   https://bugzilla.suse.com/1178905
   https://bugzilla.suse.com/1178932
   https://bugzilla.suse.com/1179569
   https://bugzilla.suse.com/1179997
   https://bugzilla.suse.com/1182766

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"69","type":"x","order":"1","pct":75.82,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"14","type":"x","order":"2","pct":15.38,"resources":[]},{"id":"181","title":"Hardly ever","votes":"8","type":"x","order":"3","pct":8.79,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.