Security update for ceph
Announcement ID: | SUSE-SU-2017:3171-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has 15 security fixes can now be installed.
Description:
This update provides Ceph 10.2.10, which brings fixes and enhancements:
This security issue was fixed:
- CVE-2017-7519: libradosstriper processes arbitrary printf placeholders in user input. (bsc#1043767)
- CVE-2016-9579: Do not abort RGW server when accepting a CORS request with short origin. (bsc#1014986)
These non-security issues were fixed:
- common: Add rdbmap to ceph-common. (bsc#1029482)
- tools/rados: Default to include clone objects when executing "cache-flush-evict-all". (bsc#1003891)
- mon, ceph-disk: Add lockbox permissions to bootstrap-osd. (bsc#1008435)
- ceph_volume_client: Fix _recover_auth_meta() method. (bsc#1008501)
- systemd/ceph-disk: Reduce ceph-disk flock contention. (bsc#1012100)
- doc: Add verbiage to rbdmap manpage. (bsc#1015748)
- doc: Add Install section to systemd rbdmap.service file. (bsc#1015748)
- ceph systemd dependencies are wrong (bsc#1042973)
- ceph-disk omits '--runtime' when enabling ceph-osd units (was: ERROR: unable to open OSD superblock) (bsc#1051598)
- SES4: 23 osd's are down after patching node. (bsc#1056536)
- Invalid error code returned by MDS is causing a kernel client WARNING (bsc#1028109)
- systemctl stop rbdmap unmaps ALL rbds and not just the ones in /etc/ceph/rbdmap (bsc#1024691)
- documentation: man crushtool does not cover the '--show-mappings' parameter (bsc#1033786)
- swift | This returns with HTTP/1.1 401 Unauthorized (bsc#1015371)
- OSDs fail to start after server reboot (bsc#1025643)
- 'ceph-deploy mds destroy' not implemented (bsc#970642)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Enterprise Storage 3
zypper in -t patch SUSE-Storage-3-2017-1975=1
Package List:
-
SUSE Enterprise Storage 3 (x86_64)
- rbd-mirror-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librados2-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-radosgw-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- libcephfs1-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-rados-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- rbd-fuse-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- rbd-nbd-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librados2-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-rbd-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-mon-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-base-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- libradosstriper1-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librbd1-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-rados-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-osd-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- libcephfs1-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-test-10.2.10+git.1510313171.6d5f0aeac1-13.7.2
- libradosstriper1-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-base-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- rbd-fuse-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-cephfs-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-rbd-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-debugsource-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-mds-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-common-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-radosgw-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-test-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.2
- ceph-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librbd1-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-mon-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librgw2-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- python-cephfs-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-test-debugsource-10.2.10+git.1510313171.6d5f0aeac1-13.7.2
- python-ceph-compat-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- librgw2-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-fuse-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-mds-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- rbd-mirror-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-common-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- rbd-nbd-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-fuse-debuginfo-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
- ceph-osd-10.2.10+git.1510313171.6d5f0aeac1-13.7.3
References:
- https://www.suse.com/security/cve/CVE-2016-9579.html
- https://www.suse.com/security/cve/CVE-2017-7519.html
- https://bugzilla.suse.com/show_bug.cgi?id=1003891
- https://bugzilla.suse.com/show_bug.cgi?id=1008435
- https://bugzilla.suse.com/show_bug.cgi?id=1008501
- https://bugzilla.suse.com/show_bug.cgi?id=1012100
- https://bugzilla.suse.com/show_bug.cgi?id=1014986
- https://bugzilla.suse.com/show_bug.cgi?id=1015371
- https://bugzilla.suse.com/show_bug.cgi?id=1015748
- https://bugzilla.suse.com/show_bug.cgi?id=1024691
- https://bugzilla.suse.com/show_bug.cgi?id=1025643
- https://bugzilla.suse.com/show_bug.cgi?id=1028109
- https://bugzilla.suse.com/show_bug.cgi?id=1029482
- https://bugzilla.suse.com/show_bug.cgi?id=1033786
- https://bugzilla.suse.com/show_bug.cgi?id=1042973
- https://bugzilla.suse.com/show_bug.cgi?id=1043767
- https://bugzilla.suse.com/show_bug.cgi?id=1051598
- https://bugzilla.suse.com/show_bug.cgi?id=1056536
- https://bugzilla.suse.com/show_bug.cgi?id=970642