QID 239270
Date Published: 2021-05-10
QID 239270: Red Hat Update for Red Hat Ceph Storage (RHSA-2021:1452)
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage.Perf Tools is a collection of performance analysis tools, including a high performance multi-threaded malloc()
implementation that works particularly well with threads and STL, a thread-friendly heap-checker, a heap profiler, and a cpu-profiler.The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface (TCMU). It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores.
Security Fix(es): tcmu-runner: SCSI target (LIO)
write to any block on ILO backstore (CVE-2021-3139)
ceph: mgr modules' passwords are in clear text in mgr logs (CVE-2020-25678)
Affected Products:
Red Hat Enterprise Linux Server 7 x86_64
Red Hat Ceph Storage MON 4 for RHEL 8 x86_64
Red Hat Ceph Storage MON 4 for RHEL 7 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 8 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 7 x86_64
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Ceph Storage for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage for IBM z Systems 4 s390x
Red Hat Ceph Storage MON for IBM z Systems 4 s390x
Red Hat Ceph Storage OSD for IBM z Systems 4 s390x
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
On successful exploitation, it could allow an attacker to execute code.
Refer to Red Hat security advisory RHSA-2021:1452 to address this issue and obtain more information.
- RHSA-2021:1452 -
access.redhat.com/errata/RHSA-2021:1452?language=en
CVEs related to QID 239270
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| RHSA-2021:1452 | Red Hat Enterprise Linux |
|