CWE
918
Advisory Published

RHSA-2021:1518: Important: Red Hat Ceph Storage 3.3 Security and Bug Fix Update

First published: Thu May 06 2021(Updated: )

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.<br>The ceph-ansible package provides Ansible playbooks for installing, maintaining, and upgrading Red Hat Ceph Storage.<br>Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB &amp; OpenTSDB. <br>The tcmu-runner packages provide a service that handles the complexity of the LIO kernel target's userspace passthrough interface (TCMU). It presents a C plugin API for extension modules that handle SCSI requests in ways not possible or suitable to be handled by LIO's in-kernel backstores.<br>Security Fix(es):<br><li> grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL (CVE-2020-13379)</li> <li> ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila (CVE-2020-27781)</li> <li> tcmu-runner: SCSI target (LIO) write to any block on ILO backstore (CVE-2021-3139)</li> <li> ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW (CVE-2020-12059)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br>This advisory fixes the following bug:<br><li> When rebooting OSDs, the `_OSD down_` tab in the `_CEPH Backend storage_` dashboard shows the correct number of OSDs that is `down`. However, when all OSDs are `up` again after the reboot, the tab continues showing the number of `down` OSDs. With this update, both CLI and Grafana values are matching during osd up/down operation and working as expected. (BZ#1652233)</li> All users of Red Hat Ceph Storage are advised to upgrade to these updated packages.

Affected SoftwareAffected VersionHow to fix
redhat/ceph<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-ansible<3.2.56-1.el7c
3.2.56-1.el7c
redhat/cephmetrics<2.0.10-1.el7c
2.0.10-1.el7c
redhat/grafana<5.2.4-3.el7c
5.2.4-3.el7c
redhat/tcmu-runner<1.4.0-3.el7c
1.4.0-3.el7c
redhat/ceph-base<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-common<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-debuginfo<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-fuse<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-mds<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-radosgw<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-selinux<12.2.12-139.el7c
12.2.12-139.el7c
redhat/cephmetrics-ansible<2.0.10-1.el7c
2.0.10-1.el7c
redhat/libcephfs-devel<12.2.12-139.el7c
12.2.12-139.el7c
redhat/libcephfs2<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librados-devel<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librados2<12.2.12-139.el7c
12.2.12-139.el7c
redhat/libradosstriper1<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librbd-devel<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librbd1<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librgw-devel<12.2.12-139.el7c
12.2.12-139.el7c
redhat/librgw2<12.2.12-139.el7c
12.2.12-139.el7c
redhat/python-cephfs<12.2.12-139.el7c
12.2.12-139.el7c
redhat/python-rados<12.2.12-139.el7c
12.2.12-139.el7c
redhat/python-rbd<12.2.12-139.el7c
12.2.12-139.el7c
redhat/python-rgw<12.2.12-139.el7c
12.2.12-139.el7c
redhat/rbd-mirror<12.2.12-139.el7c
12.2.12-139.el7c
redhat/tcmu-runner-debuginfo<1.4.0-3.el7c
1.4.0-3.el7c
redhat/ceph-mgr<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-mon<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-test<12.2.12-139.el7c
12.2.12-139.el7c
redhat/ceph-osd<12.2.12-139.el7c
12.2.12-139.el7c

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203