First published: Tue Jan 12 2021(Updated: )
The rhceph-4.2 image is based on Red Hat Ceph Storage 4.2 and Red Hat Enterprise Linux.<br>Security Fix(es):<br><li> grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (CVE-2020-13379)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br>Users are directed to the Red Hat Ceph Storage 4.2 Release Notes for information on the most significant of these changes:<br><a href="https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.2/html" target="_blank">https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.2/html</a> /release_notes/<br>All users of the rhceph-4.2 image are advised to pull this updated image from the Red Hat Ecosystem Catalog.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Ceph Storage |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:0083 is classified as important.
RHSA-2021:0083 addresses a Server-Side Request Forgery (SSRF) vulnerability in Grafana, identified as CVE-2020-13379.
To fix RHSA-2021:0083, you need to update to the latest version of the affected packages as advised in the security announcement.
The RHSA-2021:0083 vulnerability affects the rhceph-4.2 image based on Red Hat Ceph Storage 4.2 and Red Hat Enterprise Linux.
There are no known workarounds for RHSA-2021:0083, so applying the security update is recommended.