Описание
Security update for ceph
This update for ceph fixes the following issues:
Security issues fixed:
- CVE-2018-7262: rgw: malformed http headers can crash rgw (bsc#1081379).
- CVE-2017-16818: User reachable asserts allow for DoS (bsc#1063014).
Bug fixes:
- bsc#1061461: OSDs keep generating coredumps after adding new OSD node to cluster.
- bsc#1079076: RGW openssl fixes.
- bsc#1067088: Upgrade to SES5 restarted all nodes, majority of OSDs aborts during start.
- bsc#1056125: Some OSDs are down when doing performance testing on rbd image in EC Pool.
- bsc#1087269: allow_ec_overwrites option not in command options list.
- bsc#1051598: Fix mountpoint check for systemctl enable --runtime.
- bsc#1070357: Zabbix mgr module doesn't recover from HEALTH_ERR.
- bsc#1066502: After upgrading a single OSD from SES 4 to SES 5 the OSDs do not rejoin the cluster.
- bsc#1067119: Crushtool decompile creates wrong device entries (device 20 device20) for not existing / deleted OSDs.
- bsc#1060904: Loglevel misleading during keystone authentication.
- bsc#1056967: Monitors goes down after pool creation on cluster with 120 OSDs.
- bsc#1067705: Issues with RGW Multi-Site Federation between SES5 and RH Ceph Storage 2.
- bsc#1059458: Stopping / restarting rados gateway as part of deepsea stage.4 executions causes core-dump of radosgw.
- bsc#1087493: Commvault cannot reconnect to storage after restarting haproxy.
- bsc#1066182: Container synchronization between two Ceph clusters failed.
- bsc#1081600: Crash in civetweb/RGW.
- bsc#1054061: NFS-GANESHA service failing while trying to list mountpoint on client.
- bsc#1074301: OSDs keep aborting: SnapMapper failed asserts.
- bsc#1086340: XFS metadata corruption on rbd-nbd mapped image with journaling feature enabled.
- bsc#1080788: fsid mismatch when creating additional OSDs.
- bsc#1071386: Metadata spill onto block.slow.
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Server 12 SP3
ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librbd1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librgw2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-cephfs-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rados-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rbd-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
python-rgw-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Software Development Kit 12 SP3
libcephfs-devel-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librados-devel-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
librbd-devel-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
Ссылки
- Link for SUSE-SU-2018:1417-1
- E-Mail link for SUSE-SU-2018:1417-1
- SUSE Security Ratings
- SUSE Bug 1051598
- SUSE Bug 1054061
- SUSE Bug 1056125
- SUSE Bug 1056967
- SUSE Bug 1059458
- SUSE Bug 1060904
- SUSE Bug 1061461
- SUSE Bug 1063014
- SUSE Bug 1066182
- SUSE Bug 1066502
- SUSE Bug 1067088
- SUSE Bug 1067119
- SUSE Bug 1067705
- SUSE Bug 1070357
- SUSE Bug 1071386
- SUSE Bug 1074301
- SUSE Bug 1079076
Описание
RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
Ссылки
- CVE-2017-16818
- SUSE Bug 1063014
- SUSE Bug 1069253
Описание
In Ceph before 12.2.3 and 13.x through 13.0.1, the rgw_civetweb.cc RGWCivetWeb::init_env function in radosgw doesn't handle malformed HTTP headers properly, allowing for denial of service.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:ceph-common-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:libcephfs2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:librados2-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
SUSE Linux Enterprise Desktop 12 SP3:libradosstriper1-12.2.5+git.1524775272.5e7ea8cf03-2.7.1
Ссылки
- CVE-2018-7262
- SUSE Bug 1081379