Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4734 Red Hat Ceph Storage security update 20 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Ceph Storage Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Linux variants Impact/Access: Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-19337 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:4353 Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running Red Hat Ceph Storage check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Ceph Storage security, bug fix, and enhancement update Advisory ID: RHSA-2019:4353-01 Product: Red Hat Ceph Storage Advisory URL: https://access.redhat.com/errata/RHSA-2019:4353 Issue date: 2019-12-19 CVE Names: CVE-2019-19337 ===================================================================== 1. Summary: An update is now available for Red Hat Ceph Storage 3.3 that runs on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Ceph Storage 3.3 MON - ppc64le, x86_64 Red Hat Ceph Storage 3.3 OSD - ppc64le, x86_64 Red Hat Ceph Storage 3.3 Tools - noarch, ppc64le, x86_64 3. Description: Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix(es): * ceph: denial of service in RGW daemon (CVE-2019-19337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es) and Enhancement(s): For detailed information on changes in this release, see the Red Hat Ceph Storage 3.3 Release Notes available at: https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/3.3/html - - -single/release_notes/index 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1552210 - [ceph-ansible] [ceph-container] : failed to add new mgr with '--limit' option - trying to copy mgr keyring without generating 1569689 - MDS rolling-upgrade process needs to be changed to follow new recommendations 1603551 - OSP13 deploy fails pg count exceeds max 1616159 - [ceph-ansible] [ceph-container] : switch from rpm to containerized - OSDs not coming up after the switch saying encrypted device still in use 1622729 - remove warnings for unsupported variables 1623580 - [RFE] Prevent customers from installing an OSD device on the same disk as the OS 1638904 - lv-create.yml/lv-teardown.yml should fail if lv_vars.yaml has not been edited 1640525 - [Ceph-Ansible] Missing fourth and fifth scenarios in osds.yml.sample 1644611 - [RFE] Listing ceph-diskâ\x{128}\x{153}s OSDs 1646456 - [ceph-ansible] - ubuntu - playbook must fail if debian rhcs packages are not installed 1654790 - ceph-validate : No clear error when osd_scenario is not set 1664112 - Cache size is not created correctly in a hyperconverged installation when using the is_hci flag 1665877 - RBD mirroring configuration issue with ceph-ansible 1734513 - all users has access to read ceph manager client keyring files 1744529 - fetching config overrides can result in crash due to unsafe observer calls 1749097 - ceph-ansible filestore fails to start containerized OSD when using block device like /dev/loop3 1749124 - Invalid bucket added to reshard list cannot be removed 1749489 - [RFE] Support use of SSE-S3 headers in RGW with AES256 server side default encryption 1749874 - [RHCS 3][RFE] Adding Placement Group id in Large omap log message 1750115 - When listing of bucket entries, entries following an entry for which check_disk_state() = -ENOENT may not get listed 1752163 - [RFE] tools/rados: allow list objects in a specific pg in a pool 1753942 - [GSS] cephmetrics grafana dashboard do not show disk IOPS/Throughput in RHCS 3.3 1754432 - [cee/sd][ceph-ansible] when running playbook to push new ceph.conf: ansible-playbook site.yml --tags='ceph_update_config' playbook fails on "The conditional check 'osd_socket_stat.rc == 0' failed" (for mon_socket_stat too) 1757298 - [RGW]: Bucket rename creates a duplicate entry in bucket list 1757400 - please backport speed improvement in chown command in switch to containers 1765230 - [ceph-ansible]Ceph-mds -allow multimds task is failing 1765652 - upgrade is broken when no mds is present in inventory 1769760 - [ceph-ansible] - ceph_repository_type being validated unnecessarily in containerized scenario 1777050 - STS crashes with uncaught exception when session token is not base64 encoded 1779158 - [RGW]: Put object ACL fails due to missing content length 1780688 - /etc/systemd/system/ceph-osd@.service contain the wrong OSD container names 1781170 - CVE-2019-19337 ceph: denial of service in RGW daemon 6. Package List: Red Hat Ceph Storage 3.3 MON: Source: ceph-12.2.12-84.el7cp.src.rpm ppc64le: ceph-base-12.2.12-84.el7cp.ppc64le.rpm ceph-common-12.2.12-84.el7cp.ppc64le.rpm ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm ceph-mgr-12.2.12-84.el7cp.ppc64le.rpm ceph-mon-12.2.12-84.el7cp.ppc64le.rpm ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm libcephfs2-12.2.12-84.el7cp.ppc64le.rpm librados-devel-12.2.12-84.el7cp.ppc64le.rpm librados2-12.2.12-84.el7cp.ppc64le.rpm libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm librbd-devel-12.2.12-84.el7cp.ppc64le.rpm librbd1-12.2.12-84.el7cp.ppc64le.rpm librgw-devel-12.2.12-84.el7cp.ppc64le.rpm librgw2-12.2.12-84.el7cp.ppc64le.rpm python-cephfs-12.2.12-84.el7cp.ppc64le.rpm python-rados-12.2.12-84.el7cp.ppc64le.rpm python-rbd-12.2.12-84.el7cp.ppc64le.rpm python-rgw-12.2.12-84.el7cp.ppc64le.rpm x86_64: ceph-base-12.2.12-84.el7cp.x86_64.rpm ceph-common-12.2.12-84.el7cp.x86_64.rpm ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm ceph-mgr-12.2.12-84.el7cp.x86_64.rpm ceph-mon-12.2.12-84.el7cp.x86_64.rpm ceph-selinux-12.2.12-84.el7cp.x86_64.rpm ceph-test-12.2.12-84.el7cp.x86_64.rpm libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm libcephfs2-12.2.12-84.el7cp.x86_64.rpm librados-devel-12.2.12-84.el7cp.x86_64.rpm librados2-12.2.12-84.el7cp.x86_64.rpm libradosstriper1-12.2.12-84.el7cp.x86_64.rpm librbd-devel-12.2.12-84.el7cp.x86_64.rpm librbd1-12.2.12-84.el7cp.x86_64.rpm librgw-devel-12.2.12-84.el7cp.x86_64.rpm librgw2-12.2.12-84.el7cp.x86_64.rpm python-cephfs-12.2.12-84.el7cp.x86_64.rpm python-rados-12.2.12-84.el7cp.x86_64.rpm python-rbd-12.2.12-84.el7cp.x86_64.rpm python-rgw-12.2.12-84.el7cp.x86_64.rpm Red Hat Ceph Storage 3.3 OSD: Source: ceph-12.2.12-84.el7cp.src.rpm ppc64le: ceph-base-12.2.12-84.el7cp.ppc64le.rpm ceph-common-12.2.12-84.el7cp.ppc64le.rpm ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm ceph-osd-12.2.12-84.el7cp.ppc64le.rpm ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm libcephfs2-12.2.12-84.el7cp.ppc64le.rpm librados-devel-12.2.12-84.el7cp.ppc64le.rpm librados2-12.2.12-84.el7cp.ppc64le.rpm libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm librbd-devel-12.2.12-84.el7cp.ppc64le.rpm librbd1-12.2.12-84.el7cp.ppc64le.rpm librgw-devel-12.2.12-84.el7cp.ppc64le.rpm librgw2-12.2.12-84.el7cp.ppc64le.rpm python-cephfs-12.2.12-84.el7cp.ppc64le.rpm python-rados-12.2.12-84.el7cp.ppc64le.rpm python-rbd-12.2.12-84.el7cp.ppc64le.rpm python-rgw-12.2.12-84.el7cp.ppc64le.rpm x86_64: ceph-base-12.2.12-84.el7cp.x86_64.rpm ceph-common-12.2.12-84.el7cp.x86_64.rpm ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm ceph-osd-12.2.12-84.el7cp.x86_64.rpm ceph-selinux-12.2.12-84.el7cp.x86_64.rpm ceph-test-12.2.12-84.el7cp.x86_64.rpm libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm libcephfs2-12.2.12-84.el7cp.x86_64.rpm librados-devel-12.2.12-84.el7cp.x86_64.rpm librados2-12.2.12-84.el7cp.x86_64.rpm libradosstriper1-12.2.12-84.el7cp.x86_64.rpm librbd-devel-12.2.12-84.el7cp.x86_64.rpm librbd1-12.2.12-84.el7cp.x86_64.rpm librgw-devel-12.2.12-84.el7cp.x86_64.rpm librgw2-12.2.12-84.el7cp.x86_64.rpm python-cephfs-12.2.12-84.el7cp.x86_64.rpm python-rados-12.2.12-84.el7cp.x86_64.rpm python-rbd-12.2.12-84.el7cp.x86_64.rpm python-rgw-12.2.12-84.el7cp.x86_64.rpm Red Hat Ceph Storage 3.3 Tools: Source: ceph-12.2.12-84.el7cp.src.rpm ceph-ansible-3.2.38-1.el7cp.src.rpm cephmetrics-2.0.9-1.el7cp.src.rpm noarch: ceph-ansible-3.2.38-1.el7cp.noarch.rpm ppc64le: ceph-base-12.2.12-84.el7cp.ppc64le.rpm ceph-common-12.2.12-84.el7cp.ppc64le.rpm ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm ceph-fuse-12.2.12-84.el7cp.ppc64le.rpm ceph-mds-12.2.12-84.el7cp.ppc64le.rpm ceph-radosgw-12.2.12-84.el7cp.ppc64le.rpm ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm libcephfs2-12.2.12-84.el7cp.ppc64le.rpm librados-devel-12.2.12-84.el7cp.ppc64le.rpm librados2-12.2.12-84.el7cp.ppc64le.rpm libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm librbd-devel-12.2.12-84.el7cp.ppc64le.rpm librbd1-12.2.12-84.el7cp.ppc64le.rpm librgw-devel-12.2.12-84.el7cp.ppc64le.rpm librgw2-12.2.12-84.el7cp.ppc64le.rpm python-cephfs-12.2.12-84.el7cp.ppc64le.rpm python-rados-12.2.12-84.el7cp.ppc64le.rpm python-rbd-12.2.12-84.el7cp.ppc64le.rpm python-rgw-12.2.12-84.el7cp.ppc64le.rpm rbd-mirror-12.2.12-84.el7cp.ppc64le.rpm x86_64: ceph-base-12.2.12-84.el7cp.x86_64.rpm ceph-common-12.2.12-84.el7cp.x86_64.rpm ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm ceph-fuse-12.2.12-84.el7cp.x86_64.rpm ceph-mds-12.2.12-84.el7cp.x86_64.rpm ceph-radosgw-12.2.12-84.el7cp.x86_64.rpm ceph-selinux-12.2.12-84.el7cp.x86_64.rpm cephmetrics-ansible-2.0.9-1.el7cp.x86_64.rpm libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm libcephfs2-12.2.12-84.el7cp.x86_64.rpm librados-devel-12.2.12-84.el7cp.x86_64.rpm librados2-12.2.12-84.el7cp.x86_64.rpm libradosstriper1-12.2.12-84.el7cp.x86_64.rpm librbd-devel-12.2.12-84.el7cp.x86_64.rpm librbd1-12.2.12-84.el7cp.x86_64.rpm librgw-devel-12.2.12-84.el7cp.x86_64.rpm librgw2-12.2.12-84.el7cp.x86_64.rpm python-cephfs-12.2.12-84.el7cp.x86_64.rpm python-rados-12.2.12-84.el7cp.x86_64.rpm python-rbd-12.2.12-84.el7cp.x86_64.rpm python-rgw-12.2.12-84.el7cp.x86_64.rpm rbd-mirror-12.2.12-84.el7cp.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-19337 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXfwkaWaOgq3Tt24GAQgiARAAgIUv9nx1DzEgSqm8wel5n9vXBcqdBUtR /NYuPSNYYux9yu2x+3PMGcz9piqi7r7m/KNTyvG8f2U1Bp/sx/h89uSP726C/YTd RxdO32GRUdQgpMLYbr/xoEwOky/F9UYiXp54T329ngQP6TDkfdxlX/MBlG+enEbT P8pGYswjl15rDGt3L+hFQRrRQQbJvZ/fTZLWVhA+f2IG4pVBHvtKXYTtJykAIng0 rZVo+v/6KdsHi+26jrI03luQjIUN/g46gVjNBH+DXsrfj7geJR5A4vrkvS8S0JqN AT/aq4hm7/01/ftbe6ccySNSRtyf4xnT6NDhOT2fKaNqPeN4T9ccdx133uHyS8xK uk8GMK99I6yaqV+DXTCZ6CTUE+3qVse6oVqkYaaEtHnubzq/Nh6CmDreh2Vj455t x49qQoIUgxwqldYTH/Fp6l8Di7AvNk2kINWJMxyK8gNeRk05AtDYFa+Mpem/TtJe 7SIzsUY0RqpkEJhoSxkbVXDMgzk69p2PKE596g9kAxzWdSby4wOEBwtskdIxRSzb 4FoW/SVDOmPHxZH1CinBXF+CwthS4d1LaVVkkqku1pUMd7SHEK3wmUVCfaBuVkuD mxjWkuPIMlNbKOH0esktT47f8vEwiV7osgSgPATrpXClT/vIKDliPLCTaWxEP+Ko Rz9GZPQuI50= =7p2K -----END PGP SIGNATURE-----