You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa ceph

Sigurnosni nedostatak programskog paketa ceph

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for ceph
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:2922-1
Rating: important
References: #1042973 #1043767 #1051432 #1051598 #1056536

Cross-References: CVE-2017-7519
Affected Products:
SUSE Enterprise Storage 4
______________________________________________________________________________

An update that solves one vulnerability and has four fixes
is now available.

Description:

CEPH was updated to version 10.2.10, which brings several fixes and
enhancements.

Upstream 10.2.10 release summary can be found at:
https://ceph.com/releases/v10-2-10-jewel-released/

Security issues fixed:

– CVE-2017-7519: libradosstriper processed arbitrary printf placeholders
in user input (bsc#1043767)

Non-security issues fixed:

– Add explicit Before=ceph.target to systemd service file. (bsc#1042973)
– ceph-disk omits “–runtime” when enabling ceph-osd@$ID.service units.
(bsc#1051598, bsc#1056536)
– Make it possible to customize ceph-disk’s timeout and set default to 3h.
(bsc#1051432)
– Move ceph-disk from ceph-common to ceph-base.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Enterprise Storage 4:

zypper in -t patch SUSE-Storage-4-2017-1805=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Enterprise Storage 4 (aarch64 x86_64):

ceph-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-base-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-base-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-common-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-common-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-debugsource-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-fuse-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-fuse-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-mds-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-mds-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-mon-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-mon-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-osd-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-osd-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-radosgw-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-radosgw-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-test-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-test-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
ceph-test-debugsource-10.2.10+git.1507616349.698469bd8d-12.6.1
libcephfs1-10.2.10+git.1507616349.698469bd8d-12.6.1
libcephfs1-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
librados2-10.2.10+git.1507616349.698469bd8d-12.6.1
librados2-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
libradosstriper1-10.2.10+git.1507616349.698469bd8d-12.6.1
libradosstriper1-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
librbd1-10.2.10+git.1507616349.698469bd8d-12.6.1
librbd1-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
librgw2-10.2.10+git.1507616349.698469bd8d-12.6.1
librgw2-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
python-ceph-compat-10.2.10+git.1507616349.698469bd8d-12.6.1
python-cephfs-10.2.10+git.1507616349.698469bd8d-12.6.1
python-cephfs-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
python-rados-10.2.10+git.1507616349.698469bd8d-12.6.1
python-rados-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
python-rbd-10.2.10+git.1507616349.698469bd8d-12.6.1
python-rbd-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-fuse-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-fuse-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-mirror-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-mirror-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-nbd-10.2.10+git.1507616349.698469bd8d-12.6.1
rbd-nbd-debuginfo-10.2.10+git.1507616349.698469bd8d-12.6.1

References:

https://www.suse.com/security/cve/CVE-2017-7519.html
https://bugzilla.suse.com/1042973
https://bugzilla.suse.com/1043767
https://bugzilla.suse.com/1051432
https://bugzilla.suse.com/1051598
https://bugzilla.suse.com/1056536


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorVlatka Misic
Cert idNCERT-REF-2017-11-0036-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci u jezgri operacijskog sustava SUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju stjecanje uvećanih ovlasti, izvršavanje proizvoljnog programskog...

Close