Описание
Security update for ceph
This update for ceph fixes the following issues:
- CVE-2020-25660: Bring back CEPHX_V2 authorizer challenges (bsc#1177843).
- Added --container-init feature (bsc#1177319, bsc#1163764)
- Made journald as the logdriver again (bsc#1177933)
- Fixes a condition check for copy_tree, copy_files, and move_files in cephadm (bsc#1177676)
- Fixed a bug where device_health_metrics pool gets created even without any OSDs in the cluster (bsc#1173079)
- Log cephadm output /var/log/ceph/cephadm.log (bsc#1174644)
- Fixed a bug where the orchestrator didn't come up anymore after the deletion of OSDs (bsc#1176499)
- Fixed a bug where cephadm fails to deploy all OSDs and gets stuck (bsc#1177450)
- python-common will no longer skip unavailable disks (bsc#1177151)
- Added snap-schedule module (jsc#SES-704)
- Updated the SES7 downstream branding (bsc#1175120, bsc#1175161, bsc#1175169, bsc#1170498)
Список пакетов
Container suse/sles/15.2/virt-launcher:0.38.1
Container suse/sles/15.3/virt-launcher:0.45.0
SUSE Linux Enterprise Module for Basesystem 15 SP2
Ссылки
- Link for SUSE-SU-2020:3473-1
- E-Mail link for SUSE-SU-2020:3473-1
- SUSE Security Ratings
- SUSE Bug 1163764
- SUSE Bug 1170200
- SUSE Bug 1170498
- SUSE Bug 1173079
- SUSE Bug 1174466
- SUSE Bug 1174529
- SUSE Bug 1174644
- SUSE Bug 1175120
- SUSE Bug 1175161
- SUSE Bug 1175169
- SUSE Bug 1176451
- SUSE Bug 1176499
- SUSE Bug 1176638
- SUSE Bug 1177078
- SUSE Bug 1177151
- SUSE Bug 1177319
- SUSE Bug 1177344
Описание
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
Затронутые продукты
Ссылки
- CVE-2020-25660
- SUSE Bug 1177843