Security update for ceph
Announcement ID: | SUSE-SU-2019:2994-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has 22 security fixes can now be installed.
Description:
This update for ceph fixes the following issues:
-
A previous update introduced a regression with the potential to cause RocksDB data corruption in Nautilus (bsc#1156282).
-
Support for iSCSI target-level CHAP authentication was added (bsc#1145617).
-
Implemented validation and rendering of iSCSI controls based "type" (bsc#1140491).
-
Fixed an error while editing iSCSI image advanced settings (bsc#1146656).
-
Fixed a ceph-volume regression. SES customers were never exposed to this regression (bsc#1132767).
-
Fixed a denial of service vulnerability where an unauthenticated client of Ceph Object Gateway could trigger a crash from an uncaught exception (bsc#1145093, CVE-2019-10222)
-
Nautilus-based librbd clients could not open images on Jewel clusters (bsc#1151994).
-
The RGW num_rados_handles has been removed (bsc#1151995).
-
"osd_deep_scrub_large_omap_object_key_threshold" has been lowered in Nautilus (bsc#1152002).
-
The ceph dashboard now supports silencing Prometheus notifications (bsc#1141174).
-
The no{up,down,in,out} related commands have been revamped (bsc#1151990).
-
Radosgw-admin got two new subcommands for managing expire-stale objects (bsc#1151991)..
-
Deploying a single new BlueStore OSD on a cluster upgraded to SES6 from SES5 used to break pool utilization stats reported by ceph df (bsc#1151992).
-
Ceph clusters will issue a health warning if CRUSH tunables are older than "hammer" (bsc#1151993).
-
Ceph-volume prints errors to stdout with --format json (bsc#1132767).
-
Changing rgw-api-host in the dashboard does not get effective without disable/enable dashboard mgr module (bsc#1137503).
-
Silenced Alertmanager alerts in the dashboard (bsc#1141174).
-
Fixed e2e failures in the dashboard caused by webdriver version (bsc#1145759)
-
librbd always tries to acquire exclusive lock when removing image an (bsc#1149093).
Fixes in ses-manual_en:
- Added a new chapter with changelogs of Ceph releases. (bsc#1135584)
- Rewrote rolling updates and replaced running stage.0 with manual commands to prevent infinite loop. (bsc#1134444)
- Improved name of CaaSP to its fuller version. (bsc#1151439)
- Verify which OSD's are going to be removed before running stage.5. (bsc#1150406)
- Added two additional steps to recovering an OSD. (bsc#1147132)
Fixes in ceph-iscsi:
- Validate kernel LIO controls type and value (bsc#1140491)
- TPG lun_id persistence (bsc#1145618)
- Target level CHAP authentication (bsc#1145617)
ceph-iscsi was updated to the upstream 3.2 release:
- Always use host FQDN instead of shortname
- Validate min/max value for target controls and rbd:user/tcmu-runner image controls (bsc#1140491)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Enterprise Storage 6
zypper in -t patch SUSE-Storage-6-2019-2994=1
Package List:
-
SUSE Enterprise Storage 6 (noarch)
- ceph-iscsi-3.3+1570532654.g93940a4-3.7.1
- ses-admin_en-pdf-6+git145.1558531-3.17.1
- ses-manual_en-6+git145.1558531-3.17.1
- ses-deployment_en-pdf-6+git145.1558531-3.17.1
References:
- https://www.suse.com/security/cve/CVE-2019-10222.html
- https://bugzilla.suse.com/show_bug.cgi?id=1132767
- https://bugzilla.suse.com/show_bug.cgi?id=1134444
- https://bugzilla.suse.com/show_bug.cgi?id=1135584
- https://bugzilla.suse.com/show_bug.cgi?id=1137503
- https://bugzilla.suse.com/show_bug.cgi?id=1140491
- https://bugzilla.suse.com/show_bug.cgi?id=1141174
- https://bugzilla.suse.com/show_bug.cgi?id=1145093
- https://bugzilla.suse.com/show_bug.cgi?id=1145617
- https://bugzilla.suse.com/show_bug.cgi?id=1145618
- https://bugzilla.suse.com/show_bug.cgi?id=1145759
- https://bugzilla.suse.com/show_bug.cgi?id=1146656
- https://bugzilla.suse.com/show_bug.cgi?id=1147132
- https://bugzilla.suse.com/show_bug.cgi?id=1149093
- https://bugzilla.suse.com/show_bug.cgi?id=1150406
- https://bugzilla.suse.com/show_bug.cgi?id=1151439
- https://bugzilla.suse.com/show_bug.cgi?id=1151990
- https://bugzilla.suse.com/show_bug.cgi?id=1151991
- https://bugzilla.suse.com/show_bug.cgi?id=1151992
- https://bugzilla.suse.com/show_bug.cgi?id=1151993
- https://bugzilla.suse.com/show_bug.cgi?id=1151994
- https://bugzilla.suse.com/show_bug.cgi?id=1151995
- https://bugzilla.suse.com/show_bug.cgi?id=1152002
- https://bugzilla.suse.com/show_bug.cgi?id=1156282