You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Red Hat Ceph Storage

Sigurnosni nedostaci programskog paketa Red Hat Ceph Storage

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
Advisory ID: RHSA-2018:2274-01
Product: Red Hat Ceph Storage
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2274
Issue date: 2018-07-26
CVE Names: CVE-2018-1128 CVE-2018-1129 CVE-2018-10861
=====================================================================

1. Summary:

An update for ceph is now available for Red Hat Ceph Storage 2.5 for Ubuntu
16.04.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)

* ceph: cephx uses weak signatures (CVE-2018-1129)

* ceph: ceph-mon does not perform authorization on OSD pool ops
(CVE-2018-10861)

For more details about the security issue(s), including the impact, a CVSS
score and other related information refer to the CVE page(s) listed in the
Reference section.

Enhancement(s):

* Ceph OSDs now log when they shutdown due to disk operations timing out by
default. (BZ#1568897)

* The `radosgw-admin orphans find` command can inadvertently remove data
objects still in use, if followed by another operation, such as, a `rados
rm` command. Users are now warned before attempting to produce lists of
potentially orphaned objects. (BZ#1573656)

* The ‘ceph-osdomap-tool’ now has a ‘compact’ command to perform offline
compaction on an OSD’s ‘omap’ directory. (BZ#1574231)

* For S3 and Swift protocols, an option to list buckets/containers in
natural (partial) order has been added. Listing containers in sorted order
is canonical in both protocols, but is costly, and not required by some
client applications. The performance and workload cost of S3 and Swift
bucket/container listings is reduced for sharded buckets/containers when
the `allow_unordered` extension is used. (BZ#1595374)

* An asynchronous mechanism for executing the Ceph Object Gateway garbage
collection using the `librados` APIs has been introduced. The original
garbage collection mechanism serialized all processing, and lagged behind
applications in specific workloads. Garbage collection performance has been
significantly improved, and can be tuned to specific site requirements.
(BZ#1595383)

Bug Fix(es):

These updated Ceph packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Ceph Storage 2.5 Release Notes for information on the most
significant bug fixes for this release:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html
/release_notes/bug_fixes

3. Solution:

The References section of this erratum contains a download link. You must
log in to download the update.

Refer to the Red Hat Ceph Storage 2 Installation Guide for more
information:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html-s
ingle/installation_guide_for_ubuntu/#enabling_the_red_hat_ceph_storage_repo
sitories

4. Bugs fixed (https://bugzilla.redhat.com/):

1575866 – CVE-2018-1128 ceph: cephx protocol is vulnerable to replay attack
1576057 – CVE-2018-1129 ceph: cephx uses weak signatures
1593308 – CVE-2018-10861 ceph: ceph-mon does not perform authorization on OSD pool ops

5. References:

https://access.redhat.com/security/cve/CVE-2018-1128
https://access.redhat.com/security/cve/CVE-2018-1129
https://access.redhat.com/security/cve/CVE-2018-10861
https://rhcs.download.redhat.com/ubuntu
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=2cms
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

 

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory (PDC)

Synopsis: Moderate: Red Hat Ceph Storage 2.5 security, enhancement, and bug fix update
Advisory ID: RHSA-2018:2261-01
Product: Red Hat Ceph Storage
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2261
Issue date: 2018-07-26
CVE Names: CVE-2018-1128 CVE-2018-1129 CVE-2018-10861
=====================================================================

1. Summary:

An update for ceph is now available for Red Hat Ceph Storage 2.5 for Red
Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ceph Storage 2.5 Client-Tools – noarch, x86_64
Red Hat Ceph Storage 2.5 ComputeNode-Tools – noarch, x86_64
Red Hat Ceph Storage 2.5 MON – x86_64
Red Hat Ceph Storage 2.5 OSD – x86_64
Red Hat Ceph Storage 2.5 Server-Tools – noarch, x86_64
Red Hat Ceph Storage 2.5 Workstation-Tools – noarch, x86_64

3. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: cephx protocol is vulnerable to replay attack (CVE-2018-1128)

* ceph: cephx uses weak signatures (CVE-2018-1129)

* ceph: ceph-mon does not perform authorization on OSD pool ops
(CVE-2018-10861)

For more details about the security issue(s), including the impact, a CVSS
score and other related information refer to the CVE page(s) listed in the
Reference section.

Enhancement(s):

* Ceph OSDs now logs when they shutdown due to disk operations timing out
by default. (BZ#1568897)

* The `radosgw-admin orphans find` command can inadvertently remove data
objects still in use, if followed by another operation, such as, a `rados
rm` command. Users are now warned before attempting to produce lists of
potentially orphaned objects. (BZ#1573656)

* The ‘ceph-osdomap-tool’ now has a ‘compact’ command to perform offline
compaction on an OSD’s ‘omap’ directory. (BZ#1574231)

* For S3 and Swift protocols, an option to list buckets/containers in
natural (partial) order has been added. Listing containers in sorted order
is canonical in both protocols, but is costly, and not required by some
client applications. The performance and workload cost of S3 and Swift
bucket/container listings is reduced for sharded buckets/containers when
the `allow_unordered` extension is used. (BZ#1595374)

* An asynchronous mechanism for executing the Ceph Object Gateway garbage
collection using the `librados` APIs has been introduced. The original
garbage collection mechanism serialized all processing, and lagged behind
applications in specific workloads. Garbage collection performance has been
significantly improved, and can be tuned to specific site requirements.
(BZ#1595383)

Bug Fix(es):

These updated ceph packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Ceph Storage 2.5 Release Notes for information on the most
significant bug fixes for this release:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html
/release_notes/bug_fixes

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1448084 – [rbd-mirror] : manually removing a replicated image might result in an empty image
1515341 – [rbd] rbd du on empty pool does not return proper output
1522881 – RGW Memory Leak
1548071 – [CEE/SD][ceph-ansible][RHCS2]rolling-update.yml does not set noout,noscrub and nodeep-scrub flags
1554963 – Pool create cmd’s expected_num_objects is not properly interpreted
1563825 – Ubuntu build errors because of “no such option: –use-wheel” in pip
1568897 – [RFE][CEE/SD] change “osd_max_markdown_count” dout level from (10) -> (0) for RHCS 2.y version
1574231 – RHCS 2.5.1 – Add compact operation to ceph-osdomap-tool
1575866 – CVE-2018-1128 ceph: cephx protocol is vulnerable to replay attack
1576057 – CVE-2018-1129 ceph: cephx uses weak signatures
1581579 – After latest environment update all ceph-disk@dev-sdXX.service are in failed state
1584218 – RGW listing versioned bucket objects always give 1 extra entry in the list in every 1000 entries
1584763 – Some versioned objects don’t sync when uploaded with ‘s3cmd sync’
1584829 – objects in cache never refresh after rgw_cache_expiry_interval
1593308 – CVE-2018-10861 ceph: ceph-mon does not perform authorization on OSD pool ops
1595374 – [RFE] rgw: implement partial order bucket/container listing (perf)
1595383 – [RFE] implement parallel async/mt garbage collection
1595386 – RGW spinning at 100% CPU with no op traffic
1599507 – [Continuous OSD memory usage growth in a HEALTH_OK cluster] RGW workload makes OSD memory explode

6. Package List:

Red Hat Ceph Storage 2.5 Client-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 ComputeNode-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 MON:

Source:
ceph-10.2.10-28.el7cp.src.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-mon-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
ceph-test-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 OSD:

Source:
ceph-10.2.10-28.el7cp.src.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-osd-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
ceph-test-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 Server-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

Red Hat Ceph Storage 2.5 Workstation-Tools:

Source:
ceph-10.2.10-28.el7cp.src.rpm
ceph-ansible-3.0.39-1.el7cp.src.rpm

noarch:
ceph-ansible-3.0.39-1.el7cp.noarch.rpm

x86_64:
ceph-base-10.2.10-28.el7cp.x86_64.rpm
ceph-common-10.2.10-28.el7cp.x86_64.rpm
ceph-debuginfo-10.2.10-28.el7cp.x86_64.rpm
ceph-fuse-10.2.10-28.el7cp.x86_64.rpm
ceph-mds-10.2.10-28.el7cp.x86_64.rpm
ceph-radosgw-10.2.10-28.el7cp.x86_64.rpm
ceph-selinux-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-10.2.10-28.el7cp.x86_64.rpm
libcephfs1-devel-10.2.10-28.el7cp.x86_64.rpm
librados2-10.2.10-28.el7cp.x86_64.rpm
librados2-devel-10.2.10-28.el7cp.x86_64.rpm
librbd1-10.2.10-28.el7cp.x86_64.rpm
librbd1-devel-10.2.10-28.el7cp.x86_64.rpm
librgw2-10.2.10-28.el7cp.x86_64.rpm
librgw2-devel-10.2.10-28.el7cp.x86_64.rpm
python-cephfs-10.2.10-28.el7cp.x86_64.rpm
python-rados-10.2.10-28.el7cp.x86_64.rpm
python-rbd-10.2.10-28.el7cp.x86_64.rpm
rbd-mirror-10.2.10-28.el7cp.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1128
https://access.redhat.com/security/cve/CVE-2018-1129
https://access.redhat.com/security/cve/CVE-2018-10861
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2.5/html/release_notes/bug_fixes

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=DXPE
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Red Hat JBoss Enterprise Application Platform

Otkriveni su sigurnosni nedostaci u programskom paketu Red Hat JBoss Enterprise Application Platform. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje MitM...

Close