Security update for ceph

Announcement ID: SUSE-SU-2019:0586-1
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2018-10861 ( SUSE ): 7.3 CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-10861 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2018-1128 ( SUSE ): 8.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  • CVE-2018-1128 ( NVD ): 7.5 CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2018-1129 ( SUSE ): 8.1 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • CVE-2018-1129 ( NVD ): 6.5 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • CVE-2018-14662 ( SUSE ): 1.8 CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
  • CVE-2018-14662 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2018-14662 ( NVD ): 5.7 CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2018-16846 ( SUSE ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-16846 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2018-16846 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • Basesystem Module 15
  • SUSE Linux Enterprise Desktop 15
  • SUSE Linux Enterprise High Performance Computing 15
  • SUSE Linux Enterprise Server 15
  • SUSE Linux Enterprise Server for SAP Applications 15

An update that solves five vulnerabilities and has two security fixes can now be installed.

Description:

This update for ceph version 13.2.4 fixes the following issues:

Security issues fixed:

  • CVE-2018-14662: Fixed an issue with LUKS 'config-key' safety (bsc#1111177)
  • CVE-2018-10861: Fixed an authorization bypass on OSD pool ops in ceph-mon (bsc#1099162)
  • CVE-2018-1128: Fixed signature check bypass in cephx (bsc#1096748)
  • CVE-2018-1129: Fixed replay attack in cephx protocol (bsc#1096748)
  • CVE-2018-16846: Enforced bounds on max-keys/max-uploads/max-parts in rgw

Non-security issues fixed:

  • ceph-volume Python 3 fixes (bsc#1114567)
  • fix python3 module loading (bsc#1086613)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Basesystem Module 15
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-586=1

Package List:

  • Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
    • librados2-13.2.4.125+gad802694f5-3.7.2
    • libradosstriper-devel-13.2.4.125+gad802694f5-3.7.2
    • ceph-common-13.2.4.125+gad802694f5-3.7.2
    • python3-rados-13.2.4.125+gad802694f5-3.7.2
    • python3-rbd-13.2.4.125+gad802694f5-3.7.2
    • librbd1-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • librados2-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • libcephfs-devel-13.2.4.125+gad802694f5-3.7.2
    • rados-objclass-devel-13.2.4.125+gad802694f5-3.7.2
    • librbd-devel-13.2.4.125+gad802694f5-3.7.2
    • ceph-debugsource-13.2.4.125+gad802694f5-3.7.2
    • python3-cephfs-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • python3-rgw-13.2.4.125+gad802694f5-3.7.2
    • librbd1-13.2.4.125+gad802694f5-3.7.2
    • libcephfs2-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • librados-devel-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • libradosstriper1-13.2.4.125+gad802694f5-3.7.2
    • librgw2-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • libradosstriper1-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • python3-rbd-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • librados-devel-13.2.4.125+gad802694f5-3.7.2
    • librgw2-13.2.4.125+gad802694f5-3.7.2
    • python3-cephfs-13.2.4.125+gad802694f5-3.7.2
    • libcephfs2-13.2.4.125+gad802694f5-3.7.2
    • python3-rados-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • python3-rgw-debuginfo-13.2.4.125+gad802694f5-3.7.2
    • librgw-devel-13.2.4.125+gad802694f5-3.7.2
    • ceph-common-debuginfo-13.2.4.125+gad802694f5-3.7.2

References: