QID 239428

Date Published: 2021-06-21

QID 239428: Red Hat Update for Red Hat Ceph Storage 4.2 (RHSA-2021:2445)

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage.The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface (TCMU). It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores.

Security Fix(es): ceph: Unauthorized global_id reuse in cephx (CVE-2021-20288) ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers (CVE-2020-27839) ceph-dashboard: Cross-site scripting via token Cookie (CVE-2021-3509)

Affected Products:

Red Hat Enterprise Linux Server 7 x86_64
Red Hat Ceph Storage MON 4 for RHEL 8 x86_64
Red Hat Ceph Storage MON 4 for RHEL 7 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 8 x86_64
Red Hat Ceph Storage OSD 4 for RHEL 7 x86_64
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Ceph Storage for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage MON for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 8 ppc64le
Red Hat Ceph Storage OSD for Power 4 for RHEL 7 ppc64le
Red Hat Ceph Storage for IBM z Systems 4 s390x
Red Hat Ceph Storage MON for IBM z Systems 4 s390x
Red Hat Ceph Storage OSD for IBM z Systems 4 s390x

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

On successful exploitation, it could allow an attacker to execute code.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:2445 to address this issue and obtain more information.

    Vendor References

    CVEs related to QID 239428

    Software Advisories
    Advisory ID Software Component Link
    RHSA-2021:2445 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2021:2445?language=en