Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0494-1

Опубликовано: 10 апр. 2020
Источник: suse-cvrf

Описание

Security update for ceph

This update for ceph fixes the following issues:

  • CVE-2020-1759: Fixed once reuse in msgr V2 secure mode (bsc#1166403)
  • CVE-2020-1760: Fixed XSS due to RGW GetObject header-splitting (bsc#1166484).

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Список пакетов

openSUSE Leap 15.1
ceph-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-base-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-common-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-dashboard-e2e-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-grafana-dashboards-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mds-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-dashboard-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-diskprediction-cloud-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-diskprediction-local-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-k8sevents-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-rook-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mgr-ssh-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-mon-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-osd-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-prometheus-alerts-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-radosgw-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-resource-agents-14.2.5.389+gb0f23ac248-lp151.2.13.1
ceph-test-14.2.5.389+gb0f23ac248-lp151.2.13.1
cephfs-shell-14.2.5.389+gb0f23ac248-lp151.2.13.1
libcephfs-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
libcephfs2-14.2.5.389+gb0f23ac248-lp151.2.13.1
librados-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
librados2-14.2.5.389+gb0f23ac248-lp151.2.13.1
libradospp-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
libradosstriper-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
libradosstriper1-14.2.5.389+gb0f23ac248-lp151.2.13.1
librbd-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
librbd1-14.2.5.389+gb0f23ac248-lp151.2.13.1
librgw-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
librgw2-14.2.5.389+gb0f23ac248-lp151.2.13.1
python3-ceph-argparse-14.2.5.389+gb0f23ac248-lp151.2.13.1
python3-cephfs-14.2.5.389+gb0f23ac248-lp151.2.13.1
python3-rados-14.2.5.389+gb0f23ac248-lp151.2.13.1
python3-rbd-14.2.5.389+gb0f23ac248-lp151.2.13.1
python3-rgw-14.2.5.389+gb0f23ac248-lp151.2.13.1
rados-objclass-devel-14.2.5.389+gb0f23ac248-lp151.2.13.1
rbd-fuse-14.2.5.389+gb0f23ac248-lp151.2.13.1
rbd-mirror-14.2.5.389+gb0f23ac248-lp151.2.13.1
rbd-nbd-14.2.5.389+gb0f23ac248-lp151.2.13.1

Описание

A vulnerability was found in Red Hat Ceph Storage 4 and Red Hat Openshift Container Storage 4.2 where, A nonce reuse vulnerability was discovered in the secure mode of the messenger v2 protocol, which can allow an attacker to forge auth tags and potentially manipulate the data by leveraging the reuse of a nonce in a session. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks.


Затронутые продукты
openSUSE Leap 15.1:ceph-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-base-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-common-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.389+gb0f23ac248-lp151.2.13.1

Ссылки

Описание

A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.


Затронутые продукты
openSUSE Leap 15.1:ceph-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-base-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-common-14.2.5.389+gb0f23ac248-lp151.2.13.1
openSUSE Leap 15.1:ceph-dashboard-e2e-14.2.5.389+gb0f23ac248-lp151.2.13.1

Ссылки