SUSE: 2022:2817-1 important: ceph | LinuxSecurity.com

   SUSE Security Update: Security update for ceph
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:2817-1
Rating:             important
References:         #1194131 #1194875 #1195359 #1196044 #1196733 
                    #1196785 #1200064 #1200553 SES-2515 
Cross-References:   CVE-2021-3979
CVSS scores:
                    CVE-2021-3979 (SUSE): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Enterprise Storage 7.1
______________________________________________________________________________

   An update that solves one vulnerability, contains one
   feature and has 7 fixes is now available.

Description:

   This update for ceph fixes the following issues:

   - Update to 16.2.9-536-g41a9f9a5573:
     + (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in
       RGWRadosBILogTrimCR
     + (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option
       (CVE-2021-3979)

   - Update to 16.2.9-158-gd93952c7eea:
     + cmake: check for python(\d)\.(\d+) when building boost
     + make-dist: patch boost source to support python 3.10

   - Update to ceph-16.2.9-58-ge2e5cb80063:
     + (bsc#1200064, pr#480) Remove last vestiges of docker.io image paths

   - Update to 16.2.9.50-g7d9f12156fb:
     + (jsc#SES-2515) High-availability NFS export
     + (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only
       using hostname
     + (bsc#1196785) cephadm: avoid crashing on expected non-zero exit

   - Update to 16.2.7-969-g6195a460d89
     + (jsc#SES-2515) High-availability NFS export

   - Update to v16.2.7-654-gd5a90ff46f0
     + (bsc#1196733) remove build directory during %clean

   - Update to v16.2.7-652-gf5dc462fdb5
     + (bsc#1194875) [SES7P] include/buffer: include memory


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Enterprise Storage 7.1:

      zypper in -t patch SUSE-Storage-7.1-2022-2817=1



Package List:

   - SUSE Enterprise Storage 7.1 (aarch64 x86_64):

      ceph-base-16.2.9.536+g41a9f9a5573-150300.3.3.1
      ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
      ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.3.3.1
      libcephfs2-16.2.9.536+g41a9f9a5573-150300.3.3.1
      libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librados2-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librbd1-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librgw2-16.2.9.536+g41a9f9a5573-150300.3.3.1
      librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-cephfs-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rados-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rgw-16.2.9.536+g41a9f9a5573-150300.3.3.1
      python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
      rbd-nbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
      rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1

   - SUSE Enterprise Storage 7.1 (noarch):

      cephadm-16.2.9.536+g41a9f9a5573-150300.3.3.1


References:

   https://www.suse.com/security/cve/CVE-2021-3979.html
   https://bugzilla.suse.com/1194131
   https://bugzilla.suse.com/1194875
   https://bugzilla.suse.com/1195359
   https://bugzilla.suse.com/1196044
   https://bugzilla.suse.com/1196733
   https://bugzilla.suse.com/1196785
   https://bugzilla.suse.com/1200064
   https://bugzilla.suse.com/1200553

SUSE: 2022:2817-1 important: ceph

August 16, 2022
An update that solves one vulnerability, contains one feature and has 7 fixes is now available

Summary

This update for ceph fixes the following issues: - Update to 16.2.9-536-g41a9f9a5573: + (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in RGWRadosBILogTrimCR + (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option (CVE-2021-3979) - Update to 16.2.9-158-gd93952c7eea: + cmake: check for python(\d)\.(\d+) when building boost + make-dist: patch boost source to support python 3.10 - Update to ceph-16.2.9-58-ge2e5cb80063: + (bsc#1200064, pr#480) Remove last vestiges of docker.io image paths - Update to 16.2.9.50-g7d9f12156fb: + (jsc#SES-2515) High-availability NFS export + (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only using hostname + (bsc#1196785) cephadm: avoid crashing on expected non-zero exit - Update to 16.2.7-969-g6195a460d89 + (jsc#SES-2515) High-availability NFS export - Update to v16.2.7-654-gd5a90ff46f0 + (bsc#1196733) remove build directory during %clean - Update to v16.2.7-652-gf5dc462fdb5 + (bsc#1194875) [SES7P] include/buffer: include memory Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Enterprise Storage 7.1: zypper in -t patch SUSE-Storage-7.1-2022-2817=1 Package List: - SUSE Enterprise Storage 7.1 (aarch64 x86_64): ceph-base-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.3.3.1 libcephfs2-16.2.9.536+g41a9f9a5573-150300.3.3.1 libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librados2-16.2.9.536+g41a9f9a5573-150300.3.3.1 librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librbd1-16.2.9.536+g41a9f9a5573-150300.3.3.1 librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librgw2-16.2.9.536+g41a9f9a5573-150300.3.3.1 librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-cephfs-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rados-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rbd-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rgw-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 rbd-nbd-16.2.9.536+g41a9f9a5573-150300.3.3.1 rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 - SUSE Enterprise Storage 7.1 (noarch): cephadm-16.2.9.536+g41a9f9a5573-150300.3.3.1

References

#1194131 #1194875 #1195359 #1196044 #1196733

#1196785 #1200064 #1200553 SES-2515

Cross- CVE-2021-3979

CVSS scores:

CVE-2021-3979 (SUSE): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Enterprise Storage 7.1

https://www.suse.com/security/cve/CVE-2021-3979.html

https://bugzilla.suse.com/1194131

https://bugzilla.suse.com/1194875

https://bugzilla.suse.com/1195359

https://bugzilla.suse.com/1196044

https://bugzilla.suse.com/1196733

https://bugzilla.suse.com/1196785

https://bugzilla.suse.com/1200064

https://bugzilla.suse.com/1200553

Severity
Announcement ID: SUSE-SU-2022:2817-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.