QID 174975

Date Published: 2021-05-06

QID 174975: SUSE Enterprise Linux Security Update for ceph (SUSE-SU-2021:1473-1)

This update for ceph fixes the following issues:

- ceph was updated to 14.2.20-402-g6aa76c6815:
* CVE-2021-20288: Fixed unauthorized global_id reuse (bsc#1183074).
* CVE-2020-25678: Do not add sensitive information in Ceph log files
(bsc#1178905).
* CVE-2020-27839: Use secure cookies to store JWT Token (bsc#1179997).
* mgr/dashboard: prometheus alerting: add some leeway for package
drops and errors (bsc#1145463)
* mon: have 'mon stat' output json as well (bsc#1174466)
* rpm: ceph-mgr-dashboard recommends python3-saml on SUSE (bsc#1177200)
* mgr/dashboard: Display a warning message in Dashboard when debug
mode is enabled (bsc#1178235)
* rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
* mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
* bluestore: provide a different name for fallback allocator
(bsc#1180118)
* test/run-cli-tests: use cram from github (bsc#1181378)
* mgr/dashboard: fix "Python2 Cookie module import fails on Python3"
(bsc#1183487)
* common: make ms_bind_msgr2 default to 'false' (bsc#1180594)

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:1473-1 to address this issue and obtain further details.

    CVEs related to QID 174975

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:1473-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-May/008721.html