Security update for ceph
Announcement ID: | SUSE-SU-2022:2817-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability, contains one feature and has seven security fixes can now be installed.
Description:
This update for ceph fixes the following issues:
- Update to 16.2.9-536-g41a9f9a5573:
- (bsc#1195359, bsc#1200553) rgw: check bucket shard init status in RGWRadosBILogTrimCR
-
(bsc#1194131) ceph-volume: honour osd_dmcrypt_key_size option (CVE-2021-3979)
-
Update to 16.2.9-158-gd93952c7eea:
- cmake: check for python(\d).(\d+) when building boost
-
make-dist: patch boost source to support python 3.10
-
Update to ceph-16.2.9-58-ge2e5cb80063:
-
(bsc#1200064, pr#480) Remove last vestiges of docker.io image paths
-
Update to 16.2.9.50-g7d9f12156fb:
- (jsc#SES-2515) High-availability NFS export
- (bsc#1196044) cephadm: prometheus: The generatorURL in alerts is only using hostname
-
(bsc#1196785) cephadm: avoid crashing on expected non-zero exit
-
Update to 16.2.7-969-g6195a460d89
-
(jsc#SES-2515) High-availability NFS export
-
Update to v16.2.7-654-gd5a90ff46f0
-
(bsc#1196733) remove build directory during %clean
-
Update to v16.2.7-652-gf5dc462fdb5
- (bsc#1194875) [SES7P] include/buffer: include memory
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2022-2817=1
Package List:
-
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
- rbd-nbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librgw2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- ceph-debugsource-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rados-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rbd-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librbd1-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librados2-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-cephfs-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
- rbd-nbd-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rados-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rgw-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librgw2-16.2.9.536+g41a9f9a5573-150300.3.3.1
- ceph-common-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- ceph-base-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librados2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- ceph-base-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-rgw-16.2.9.536+g41a9f9a5573-150300.3.3.1
- librbd1-16.2.9.536+g41a9f9a5573-150300.3.3.1
- libcephfs2-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-cephfs-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-ceph-argparse-16.2.9.536+g41a9f9a5573-150300.3.3.1
- python3-ceph-common-16.2.9.536+g41a9f9a5573-150300.3.3.1
- libcephfs2-debuginfo-16.2.9.536+g41a9f9a5573-150300.3.3.1
-
SUSE Enterprise Storage 7.1 (noarch)
- cephadm-16.2.9.536+g41a9f9a5573-150300.3.3.1
References:
- https://www.suse.com/security/cve/CVE-2021-3979.html
- https://bugzilla.suse.com/show_bug.cgi?id=1194131
- https://bugzilla.suse.com/show_bug.cgi?id=1194875
- https://bugzilla.suse.com/show_bug.cgi?id=1195359
- https://bugzilla.suse.com/show_bug.cgi?id=1196044
- https://bugzilla.suse.com/show_bug.cgi?id=1196733
- https://bugzilla.suse.com/show_bug.cgi?id=1196785
- https://bugzilla.suse.com/show_bug.cgi?id=1200064
- https://bugzilla.suse.com/show_bug.cgi?id=1200553
- https://jira.suse.com/browse/SES-2515