QID 239270

Date Published: 2021-05-10

QID 239270: Red Hat Update for Red Hat Ceph Storage (RHSA-2021:1452)

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage.Perf Tools is a collection of performance analysis tools, including a high performance multi-threaded malloc()
implementation that works particularly well with threads and STL, a thread-friendly heap-checker, a heap profiler, and a cpu-profiler.The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface (TCMU). It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores.

Security Fix(es): tcmu-runner: SCSI target (LIO)
write to any block on ILO backstore (CVE-2021-3139) ceph: mgr modules' passwords are in clear text in mgr logs (CVE-2020-25678)

Affected Products:

Red Hat Enterprise Linux Server 7 x86_64
Red Hat Ceph Storage MON 4 for RHEL 8 x86_64
Red Hat Ceph Storage MON 4 for RHEL 7 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 8 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 7 x86_64
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Ceph Storage for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage for IBM z Systems 4 s390x
Red Hat Ceph Storage MON for IBM z Systems 4 s390x
Red Hat Ceph Storage OSD for IBM z Systems 4 s390x

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1452 to address this issue and obtain more information.

    Vendor References

    CVEs related to QID 239270

    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:1452 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2021:1452?language=en