SUSE: 2022:2817-1 important: ceph
Summary
This update for ceph fixes the following issues: - Update to 16.2.9-536-g41a9f9a5573: + (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in RGWRadosBILogTrimCR + (bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option (CVE-2021-3979) - Update to 16.2.9-158-gd93952c7eea: + cmake: check for python(\d)\.(\d+) when building boost + make-dist: patch boost source to support python 3.10 - Update to ceph-16.2.9-58-ge2e5cb80063: + (bsc#1200064, pr#480) Remove last vestiges of docker.io image paths - Update to 16.2.9.50-g7d9f12156fb: + (jsc#SES-2515) High-availability NFS export + (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only using hostname + (bsc#1196785) cephadm: avoid crashing on expected non-zero exit - Update to 16.2.7-969-g6195a460d89 + (jsc#SES-2515) High-availability NFS export - Update to v16.2.7-654-gd5a90ff46f0 + (bsc#1196733) remove build directory during %clean - Update to v16.2.7-652-gf5dc462fdb5 + (bsc#1194875) [SES7P] include/buffer: include memory Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Enterprise Storage 7.1: zypper in -t patch SUSE-Storage-7.1-2022-2817=1 Package List: - SUSE Enterprise Storage 7.1 (aarch64 x86_64): ceph-base-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.3.3.1 libcephfs2-16.2.9.536+g41a9f9a5573-150300.3.3.1 libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librados2-16.2.9.536+g41a9f9a5573-150300.3.3.1 librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librbd1-16.2.9.536+g41a9f9a5573-150300.3.3.1 librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 librgw2-16.2.9.536+g41a9f9a5573-150300.3.3.1 librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-cephfs-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rados-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rbd-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rgw-16.2.9.536+g41a9f9a5573-150300.3.3.1 python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 rbd-nbd-16.2.9.536+g41a9f9a5573-150300.3.3.1 rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1 - SUSE Enterprise Storage 7.1 (noarch): cephadm-16.2.9.536+g41a9f9a5573-150300.3.3.1
References
#1194131 #1194875 #1195359 #1196044 #1196733
#1196785 #1200064 #1200553 SES-2515
Cross- CVE-2021-3979
CVSS scores:
CVE-2021-3979 (SUSE): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Enterprise Storage 7.1
https://www.suse.com/security/cve/CVE-2021-3979.html
https://bugzilla.suse.com/1194131
https://bugzilla.suse.com/1194875
https://bugzilla.suse.com/1195359
https://bugzilla.suse.com/1196044
https://bugzilla.suse.com/1196733
https://bugzilla.suse.com/1196785
https://bugzilla.suse.com/1200064
https://bugzilla.suse.com/1200553