-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4734
                   Red Hat Ceph Storage security update
                             20 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Ceph Storage
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   Linux variants
Impact/Access:     Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-19337  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:4353

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running Red Hat Ceph Storage check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Ceph Storage security, bug fix, and enhancement update
Advisory ID:       RHSA-2019:4353-01
Product:           Red Hat Ceph Storage
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:4353
Issue date:        2019-12-19
CVE Names:         CVE-2019-19337 
=====================================================================

1. Summary:

An update is now available for Red Hat Ceph Storage 3.3 that runs on Red
Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ceph Storage 3.3 MON - ppc64le, x86_64
Red Hat Ceph Storage 3.3 OSD - ppc64le, x86_64
Red Hat Ceph Storage 3.3 Tools - noarch, ppc64le, x86_64

3. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* ceph: denial of service in RGW daemon (CVE-2019-19337)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es) and Enhancement(s):

For detailed information on changes in this release, see the Red Hat Ceph
Storage 3.3 Release Notes available at:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/3.3/html
- - -single/release_notes/index

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1552210 - [ceph-ansible] [ceph-container] : failed to add new mgr with '--limit' option - trying to copy mgr keyring without generating
1569689 - MDS rolling-upgrade process needs to be changed to follow new recommendations
1603551 - OSP13 deploy fails pg count exceeds max
1616159 - [ceph-ansible] [ceph-container] : switch from rpm to containerized - OSDs not coming up after the switch saying encrypted device still in use
1622729 - remove warnings for unsupported variables
1623580 - [RFE] Prevent customers from installing an OSD device on the same disk as the OS
1638904 - lv-create.yml/lv-teardown.yml should fail if lv_vars.yaml has not been edited
1640525 - [Ceph-Ansible] Missing fourth and fifth scenarios in osds.yml.sample
1644611 - [RFE] Listing ceph-diskâ\x{128}\x{153}s OSDs
1646456 - [ceph-ansible] - ubuntu - playbook must fail if debian rhcs packages are not installed
1654790 - ceph-validate : No clear error when osd_scenario is not set
1664112 - Cache size is not created correctly in a hyperconverged installation when using the is_hci flag
1665877 - RBD mirroring configuration issue with ceph-ansible
1734513 - all users has access to read ceph manager client keyring files
1744529 - fetching config overrides can result in crash due to unsafe observer calls
1749097 - ceph-ansible filestore fails to start containerized OSD when using block device like /dev/loop3
1749124 - Invalid bucket added to reshard list cannot be removed
1749489 - [RFE] Support use of SSE-S3 headers in RGW with AES256 server side default encryption
1749874 - [RHCS 3][RFE] Adding Placement Group id in Large omap log message
1750115 - When listing of bucket entries, entries following an entry for which check_disk_state() = -ENOENT may not get listed
1752163 - [RFE] tools/rados: allow list objects in a specific pg in a pool
1753942 - [GSS] cephmetrics grafana dashboard do not show disk IOPS/Throughput in RHCS 3.3
1754432 - [cee/sd][ceph-ansible] when running playbook to push new ceph.conf: ansible-playbook site.yml --tags='ceph_update_config' playbook fails on  "The conditional check 'osd_socket_stat.rc == 0' failed" (for mon_socket_stat too)
1757298 - [RGW]: Bucket rename creates a duplicate entry in bucket list
1757400 - please backport speed improvement in chown command in switch to containers
1765230 - [ceph-ansible]Ceph-mds -allow multimds task is failing
1765652 - upgrade is broken when no mds is present in inventory
1769760 - [ceph-ansible] - ceph_repository_type being validated unnecessarily in containerized scenario
1777050 - STS crashes with uncaught exception when session token is not base64 encoded
1779158 - [RGW]: Put object ACL fails due to missing content length
1780688 - /etc/systemd/system/ceph-osd@.service contain the wrong OSD container names
1781170 - CVE-2019-19337 ceph: denial of service in RGW daemon

6. Package List:

Red Hat Ceph Storage 3.3 MON:

Source:
ceph-12.2.12-84.el7cp.src.rpm

ppc64le:
ceph-base-12.2.12-84.el7cp.ppc64le.rpm
ceph-common-12.2.12-84.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm
ceph-mgr-12.2.12-84.el7cp.ppc64le.rpm
ceph-mon-12.2.12-84.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm
libcephfs2-12.2.12-84.el7cp.ppc64le.rpm
librados-devel-12.2.12-84.el7cp.ppc64le.rpm
librados2-12.2.12-84.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm
librbd-devel-12.2.12-84.el7cp.ppc64le.rpm
librbd1-12.2.12-84.el7cp.ppc64le.rpm
librgw-devel-12.2.12-84.el7cp.ppc64le.rpm
librgw2-12.2.12-84.el7cp.ppc64le.rpm
python-cephfs-12.2.12-84.el7cp.ppc64le.rpm
python-rados-12.2.12-84.el7cp.ppc64le.rpm
python-rbd-12.2.12-84.el7cp.ppc64le.rpm
python-rgw-12.2.12-84.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-84.el7cp.x86_64.rpm
ceph-common-12.2.12-84.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm
ceph-mgr-12.2.12-84.el7cp.x86_64.rpm
ceph-mon-12.2.12-84.el7cp.x86_64.rpm
ceph-selinux-12.2.12-84.el7cp.x86_64.rpm
ceph-test-12.2.12-84.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm
libcephfs2-12.2.12-84.el7cp.x86_64.rpm
librados-devel-12.2.12-84.el7cp.x86_64.rpm
librados2-12.2.12-84.el7cp.x86_64.rpm
libradosstriper1-12.2.12-84.el7cp.x86_64.rpm
librbd-devel-12.2.12-84.el7cp.x86_64.rpm
librbd1-12.2.12-84.el7cp.x86_64.rpm
librgw-devel-12.2.12-84.el7cp.x86_64.rpm
librgw2-12.2.12-84.el7cp.x86_64.rpm
python-cephfs-12.2.12-84.el7cp.x86_64.rpm
python-rados-12.2.12-84.el7cp.x86_64.rpm
python-rbd-12.2.12-84.el7cp.x86_64.rpm
python-rgw-12.2.12-84.el7cp.x86_64.rpm

Red Hat Ceph Storage 3.3 OSD:

Source:
ceph-12.2.12-84.el7cp.src.rpm

ppc64le:
ceph-base-12.2.12-84.el7cp.ppc64le.rpm
ceph-common-12.2.12-84.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm
ceph-osd-12.2.12-84.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm
libcephfs2-12.2.12-84.el7cp.ppc64le.rpm
librados-devel-12.2.12-84.el7cp.ppc64le.rpm
librados2-12.2.12-84.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm
librbd-devel-12.2.12-84.el7cp.ppc64le.rpm
librbd1-12.2.12-84.el7cp.ppc64le.rpm
librgw-devel-12.2.12-84.el7cp.ppc64le.rpm
librgw2-12.2.12-84.el7cp.ppc64le.rpm
python-cephfs-12.2.12-84.el7cp.ppc64le.rpm
python-rados-12.2.12-84.el7cp.ppc64le.rpm
python-rbd-12.2.12-84.el7cp.ppc64le.rpm
python-rgw-12.2.12-84.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-84.el7cp.x86_64.rpm
ceph-common-12.2.12-84.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm
ceph-osd-12.2.12-84.el7cp.x86_64.rpm
ceph-selinux-12.2.12-84.el7cp.x86_64.rpm
ceph-test-12.2.12-84.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm
libcephfs2-12.2.12-84.el7cp.x86_64.rpm
librados-devel-12.2.12-84.el7cp.x86_64.rpm
librados2-12.2.12-84.el7cp.x86_64.rpm
libradosstriper1-12.2.12-84.el7cp.x86_64.rpm
librbd-devel-12.2.12-84.el7cp.x86_64.rpm
librbd1-12.2.12-84.el7cp.x86_64.rpm
librgw-devel-12.2.12-84.el7cp.x86_64.rpm
librgw2-12.2.12-84.el7cp.x86_64.rpm
python-cephfs-12.2.12-84.el7cp.x86_64.rpm
python-rados-12.2.12-84.el7cp.x86_64.rpm
python-rbd-12.2.12-84.el7cp.x86_64.rpm
python-rgw-12.2.12-84.el7cp.x86_64.rpm

Red Hat Ceph Storage 3.3 Tools:

Source:
ceph-12.2.12-84.el7cp.src.rpm
ceph-ansible-3.2.38-1.el7cp.src.rpm
cephmetrics-2.0.9-1.el7cp.src.rpm

noarch:
ceph-ansible-3.2.38-1.el7cp.noarch.rpm

ppc64le:
ceph-base-12.2.12-84.el7cp.ppc64le.rpm
ceph-common-12.2.12-84.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-84.el7cp.ppc64le.rpm
ceph-fuse-12.2.12-84.el7cp.ppc64le.rpm
ceph-mds-12.2.12-84.el7cp.ppc64le.rpm
ceph-radosgw-12.2.12-84.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-84.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-84.el7cp.ppc64le.rpm
libcephfs2-12.2.12-84.el7cp.ppc64le.rpm
librados-devel-12.2.12-84.el7cp.ppc64le.rpm
librados2-12.2.12-84.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-84.el7cp.ppc64le.rpm
librbd-devel-12.2.12-84.el7cp.ppc64le.rpm
librbd1-12.2.12-84.el7cp.ppc64le.rpm
librgw-devel-12.2.12-84.el7cp.ppc64le.rpm
librgw2-12.2.12-84.el7cp.ppc64le.rpm
python-cephfs-12.2.12-84.el7cp.ppc64le.rpm
python-rados-12.2.12-84.el7cp.ppc64le.rpm
python-rbd-12.2.12-84.el7cp.ppc64le.rpm
python-rgw-12.2.12-84.el7cp.ppc64le.rpm
rbd-mirror-12.2.12-84.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-84.el7cp.x86_64.rpm
ceph-common-12.2.12-84.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-84.el7cp.x86_64.rpm
ceph-fuse-12.2.12-84.el7cp.x86_64.rpm
ceph-mds-12.2.12-84.el7cp.x86_64.rpm
ceph-radosgw-12.2.12-84.el7cp.x86_64.rpm
ceph-selinux-12.2.12-84.el7cp.x86_64.rpm
cephmetrics-ansible-2.0.9-1.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-84.el7cp.x86_64.rpm
libcephfs2-12.2.12-84.el7cp.x86_64.rpm
librados-devel-12.2.12-84.el7cp.x86_64.rpm
librados2-12.2.12-84.el7cp.x86_64.rpm
libradosstriper1-12.2.12-84.el7cp.x86_64.rpm
librbd-devel-12.2.12-84.el7cp.x86_64.rpm
librbd1-12.2.12-84.el7cp.x86_64.rpm
librgw-devel-12.2.12-84.el7cp.x86_64.rpm
librgw2-12.2.12-84.el7cp.x86_64.rpm
python-cephfs-12.2.12-84.el7cp.x86_64.rpm
python-rados-12.2.12-84.el7cp.x86_64.rpm
python-rbd-12.2.12-84.el7cp.x86_64.rpm
python-rgw-12.2.12-84.el7cp.x86_64.rpm
rbd-mirror-12.2.12-84.el7cp.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-19337
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXfwkaWaOgq3Tt24GAQgiARAAgIUv9nx1DzEgSqm8wel5n9vXBcqdBUtR
/NYuPSNYYux9yu2x+3PMGcz9piqi7r7m/KNTyvG8f2U1Bp/sx/h89uSP726C/YTd
RxdO32GRUdQgpMLYbr/xoEwOky/F9UYiXp54T329ngQP6TDkfdxlX/MBlG+enEbT
P8pGYswjl15rDGt3L+hFQRrRQQbJvZ/fTZLWVhA+f2IG4pVBHvtKXYTtJykAIng0
rZVo+v/6KdsHi+26jrI03luQjIUN/g46gVjNBH+DXsrfj7geJR5A4vrkvS8S0JqN
AT/aq4hm7/01/ftbe6ccySNSRtyf4xnT6NDhOT2fKaNqPeN4T9ccdx133uHyS8xK
uk8GMK99I6yaqV+DXTCZ6CTUE+3qVse6oVqkYaaEtHnubzq/Nh6CmDreh2Vj455t
x49qQoIUgxwqldYTH/Fp6l8Di7AvNk2kINWJMxyK8gNeRk05AtDYFa+Mpem/TtJe
7SIzsUY0RqpkEJhoSxkbVXDMgzk69p2PKE596g9kAxzWdSby4wOEBwtskdIxRSzb
4FoW/SVDOmPHxZH1CinBXF+CwthS4d1LaVVkkqku1pUMd7SHEK3wmUVCfaBuVkuD
mxjWkuPIMlNbKOH0esktT47f8vEwiV7osgSgPATrpXClT/vIKDliPLCTaWxEP+Ko
Rz9GZPQuI50=
=7p2K
-----END PGP SIGNATURE-----