QID 174975
Date Published: 2021-05-06
QID 174975: SUSE Enterprise Linux Security Update for ceph (SUSE-SU-2021:1473-1)
This update for ceph fixes the following issues:
- ceph was updated to 14.2.20-402-g6aa76c6815:
* CVE-2021-20288: Fixed unauthorized global_id reuse (bsc#1183074).
* CVE-2020-25678: Do not add sensitive information in Ceph log files
(bsc#1178905).
* CVE-2020-27839: Use secure cookies to store JWT Token (bsc#1179997).
* mgr/dashboard: prometheus alerting: add some leeway for package
drops and errors (bsc#1145463)
* mon: have 'mon stat' output json as well (bsc#1174466)
* rpm: ceph-mgr-dashboard recommends python3-saml on SUSE (bsc#1177200)
* mgr/dashboard: Display a warning message in Dashboard when debug
mode is enabled (bsc#1178235)
* rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
* mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
* bluestore: provide a different name for fallback allocator
(bsc#1180118)
* test/run-cli-tests: use cram from github (bsc#1181378)
* mgr/dashboard: fix "Python2 Cookie module import fails on Python3"
(bsc#1183487)
* common: make ms_bind_msgr2 default to 'false' (bsc#1180594)
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:1473-1 -
lists.suse.com/pipermail/sle-security-updates/2021-May/008721.html
CVEs related to QID 174975
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:1473-1 | SUSE Enterprise Linux |
|