-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1576
           Red Hat Ceph Storage 3.3 Security and Bug Fix Update
                                7 May 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Ceph Storage
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Administrator Compromise  -- Existing Account      
                   Overwrite Arbitrary Files -- Existing Account      
                   Denial of Service         -- Remote/Unauthenticated
                   Access Confidential Data  -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3139 CVE-2020-27781 CVE-2020-13379
                   CVE-2020-12059  

Reference:         ESB-2021.1446
                   ESB-2021.1298
                   ESB-2021.0106
                   ESB-2020.3237

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:1518

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Ceph Storage 3.3 Security and Bug Fix Update
Advisory ID:       RHSA-2021:1518-01
Product:           Red Hat Ceph Storage
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1518
Issue date:        2021-05-06
CVE Names:         CVE-2020-12059 CVE-2020-13379 CVE-2020-27781 
                   CVE-2021-3139 
=====================================================================

1. Summary:

An update is now available for Red Hat Ceph Storage 3.3 - Extended Life
Support on Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Ceph Storage 3 MON - ELS - ppc64le, x86_64
Red Hat Ceph Storage 3 OSD - ELS - ppc64le, x86_64
Red Hat Ceph Storage 3 Tools - ELS - noarch, ppc64le, x86_64

3. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

The ceph-ansible package provides Ansible playbooks for installing,
maintaining, and upgrading Red Hat Ceph Storage.

Grafana is an open source, feature rich metrics dashboard and graph editor
for Graphite, InfluxDB & OpenTSDB. 

The tcmu-runner packages provide a service that handles the complexity of
the LIO kernel target's userspace passthrough interface (TCMU). It presents
a C plugin API for extension modules that handle SCSI requests in ways not
possible or suitable to be handled by LIO's in-kernel backstores.

Security Fix(es):

* grafana: SSRF incorrect access control vulnerability allows
unauthenticated users to make grafana send HTTP requests to any URL
(CVE-2020-13379)

* ceph: User credentials can be manipulated and stolen by Native CephFS
consumers of OpenStack Manila (CVE-2020-27781)

* tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
(CVE-2021-3139)

* ceph: specially crafted XML payload on POST requests leads to DoS by
crashing RGW (CVE-2020-12059)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

This advisory fixes the following bug:

* When rebooting OSDs, the `_OSD down_` tab in the `_CEPH Backend storage_`
dashboard shows the correct number of OSDs that is `down`. However, when
all OSDs are `up` again after the reboot, the tab continues showing the
number of `down` OSDs. With this update, both CLI and Grafana values are
matching during osd up/down operation and working as expected. (BZ#1652233)

All users of Red Hat Ceph Storage are advised to upgrade to these updated
packages.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1650209 - [Ceph-Dashboard] Latency by Server report appears to be calculating the latency incorrectly.
1652233 - [ceph-metrics]'OSDs down' tab is not working properly in 'CEPH Backend storage' Dashboard
1827262 - CVE-2020-12059 ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW
1829821 - facing rgw error - "/builddir/build/BUILD/ceph-12.2.8/src/rgw/rgw_sync.cc: In function 'virtual int PurgePeriodLogsCR::operate()' thread 7efe125d1700 .. .../rgw_sync.cc: 2387: FAILED assert(cursor) "
1830329 - rgw_bucket_parse_bucket_key function is holding old tenant value, when this function is executed in a loop
1832372 - MDS may crash when evicting a client
1842390 - [GSS] cephmetrics grafana dashboard do not show disk IOPS/Throughput in RHCS 3.3
1843640 - CVE-2020-13379 grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
1871035 - [Ceph-Ansible]: ceph-ansible (3.2) deployment fails on pool creation because of exceeding max pgs value
1876551 - [ceph-ansible] : cluster configuration failed in step force peer addition as potential bootstrap peer saying object has no attribute
1882724 - containerized daemons die on dockerd restarts
1887661 - [GSS][RGW] ERROR: remove_expired_obj (rchs3.3z6)
1894426 - [GSS][RHCS3]high num_objects count in rgw.none bucket stats output
1896392 - [ceph-ansible] [ceph-container] : switch from rpm to containerized - OSDs not coming up after the switch saying encrypted device still in use
1896448 - [ceph-ansible] : switch from rpm to containerized - set proper permission - './block': Permission denied
1900109 - CVE-2020-27781 ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila
1901897 - osd containers fail to start when sr0 device is detected but no media is inserted
1906293 - [GSS] addition of osd getting failed in containerized RHCS environment with osd_auto_discovery: true
1915070 - [RGW] RGW failed assert (idx < m_upper_bound) in perf_counters
1915078 - rgw: omnibus 3.3 bucket listing correctness and perf issues
1916045 - CVE-2021-3139 tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
1947072 - [container]: Osds are not deployed in containerized RHCS environment with osd_auto_discovery: false
1948050 - Switch to container playbook fails on colocated scenarios for Ubuntu OS

6. Package List:

Red Hat Ceph Storage 3 MON - ELS:

Source:
ceph-12.2.12-139.el7cp.src.rpm

ppc64le:
ceph-base-12.2.12-139.el7cp.ppc64le.rpm
ceph-common-12.2.12-139.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-139.el7cp.ppc64le.rpm
ceph-mgr-12.2.12-139.el7cp.ppc64le.rpm
ceph-mon-12.2.12-139.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-139.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-139.el7cp.ppc64le.rpm
libcephfs2-12.2.12-139.el7cp.ppc64le.rpm
librados-devel-12.2.12-139.el7cp.ppc64le.rpm
librados2-12.2.12-139.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-139.el7cp.ppc64le.rpm
librbd-devel-12.2.12-139.el7cp.ppc64le.rpm
librbd1-12.2.12-139.el7cp.ppc64le.rpm
librgw-devel-12.2.12-139.el7cp.ppc64le.rpm
librgw2-12.2.12-139.el7cp.ppc64le.rpm
python-cephfs-12.2.12-139.el7cp.ppc64le.rpm
python-rados-12.2.12-139.el7cp.ppc64le.rpm
python-rbd-12.2.12-139.el7cp.ppc64le.rpm
python-rgw-12.2.12-139.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-139.el7cp.x86_64.rpm
ceph-common-12.2.12-139.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-139.el7cp.x86_64.rpm
ceph-mgr-12.2.12-139.el7cp.x86_64.rpm
ceph-mon-12.2.12-139.el7cp.x86_64.rpm
ceph-selinux-12.2.12-139.el7cp.x86_64.rpm
ceph-test-12.2.12-139.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-139.el7cp.x86_64.rpm
libcephfs2-12.2.12-139.el7cp.x86_64.rpm
librados-devel-12.2.12-139.el7cp.x86_64.rpm
librados2-12.2.12-139.el7cp.x86_64.rpm
libradosstriper1-12.2.12-139.el7cp.x86_64.rpm
librbd-devel-12.2.12-139.el7cp.x86_64.rpm
librbd1-12.2.12-139.el7cp.x86_64.rpm
librgw-devel-12.2.12-139.el7cp.x86_64.rpm
librgw2-12.2.12-139.el7cp.x86_64.rpm
python-cephfs-12.2.12-139.el7cp.x86_64.rpm
python-rados-12.2.12-139.el7cp.x86_64.rpm
python-rbd-12.2.12-139.el7cp.x86_64.rpm
python-rgw-12.2.12-139.el7cp.x86_64.rpm

Red Hat Ceph Storage 3 OSD - ELS:

Source:
ceph-12.2.12-139.el7cp.src.rpm

ppc64le:
ceph-base-12.2.12-139.el7cp.ppc64le.rpm
ceph-common-12.2.12-139.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-139.el7cp.ppc64le.rpm
ceph-osd-12.2.12-139.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-139.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-139.el7cp.ppc64le.rpm
libcephfs2-12.2.12-139.el7cp.ppc64le.rpm
librados-devel-12.2.12-139.el7cp.ppc64le.rpm
librados2-12.2.12-139.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-139.el7cp.ppc64le.rpm
librbd-devel-12.2.12-139.el7cp.ppc64le.rpm
librbd1-12.2.12-139.el7cp.ppc64le.rpm
librgw-devel-12.2.12-139.el7cp.ppc64le.rpm
librgw2-12.2.12-139.el7cp.ppc64le.rpm
python-cephfs-12.2.12-139.el7cp.ppc64le.rpm
python-rados-12.2.12-139.el7cp.ppc64le.rpm
python-rbd-12.2.12-139.el7cp.ppc64le.rpm
python-rgw-12.2.12-139.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-139.el7cp.x86_64.rpm
ceph-common-12.2.12-139.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-139.el7cp.x86_64.rpm
ceph-osd-12.2.12-139.el7cp.x86_64.rpm
ceph-selinux-12.2.12-139.el7cp.x86_64.rpm
ceph-test-12.2.12-139.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-139.el7cp.x86_64.rpm
libcephfs2-12.2.12-139.el7cp.x86_64.rpm
librados-devel-12.2.12-139.el7cp.x86_64.rpm
librados2-12.2.12-139.el7cp.x86_64.rpm
libradosstriper1-12.2.12-139.el7cp.x86_64.rpm
librbd-devel-12.2.12-139.el7cp.x86_64.rpm
librbd1-12.2.12-139.el7cp.x86_64.rpm
librgw-devel-12.2.12-139.el7cp.x86_64.rpm
librgw2-12.2.12-139.el7cp.x86_64.rpm
python-cephfs-12.2.12-139.el7cp.x86_64.rpm
python-rados-12.2.12-139.el7cp.x86_64.rpm
python-rbd-12.2.12-139.el7cp.x86_64.rpm
python-rgw-12.2.12-139.el7cp.x86_64.rpm

Red Hat Ceph Storage 3 Tools - ELS:

Source:
ceph-12.2.12-139.el7cp.src.rpm
ceph-ansible-3.2.56-1.el7cp.src.rpm
cephmetrics-2.0.10-1.el7cp.src.rpm
grafana-5.2.4-3.el7cp.src.rpm
tcmu-runner-1.4.0-3.el7cp.src.rpm

noarch:
ceph-ansible-3.2.56-1.el7cp.noarch.rpm

ppc64le:
ceph-base-12.2.12-139.el7cp.ppc64le.rpm
ceph-common-12.2.12-139.el7cp.ppc64le.rpm
ceph-debuginfo-12.2.12-139.el7cp.ppc64le.rpm
ceph-fuse-12.2.12-139.el7cp.ppc64le.rpm
ceph-mds-12.2.12-139.el7cp.ppc64le.rpm
ceph-radosgw-12.2.12-139.el7cp.ppc64le.rpm
ceph-selinux-12.2.12-139.el7cp.ppc64le.rpm
libcephfs-devel-12.2.12-139.el7cp.ppc64le.rpm
libcephfs2-12.2.12-139.el7cp.ppc64le.rpm
librados-devel-12.2.12-139.el7cp.ppc64le.rpm
librados2-12.2.12-139.el7cp.ppc64le.rpm
libradosstriper1-12.2.12-139.el7cp.ppc64le.rpm
librbd-devel-12.2.12-139.el7cp.ppc64le.rpm
librbd1-12.2.12-139.el7cp.ppc64le.rpm
librgw-devel-12.2.12-139.el7cp.ppc64le.rpm
librgw2-12.2.12-139.el7cp.ppc64le.rpm
python-cephfs-12.2.12-139.el7cp.ppc64le.rpm
python-rados-12.2.12-139.el7cp.ppc64le.rpm
python-rbd-12.2.12-139.el7cp.ppc64le.rpm
python-rgw-12.2.12-139.el7cp.ppc64le.rpm
rbd-mirror-12.2.12-139.el7cp.ppc64le.rpm
tcmu-runner-1.4.0-3.el7cp.ppc64le.rpm
tcmu-runner-debuginfo-1.4.0-3.el7cp.ppc64le.rpm

x86_64:
ceph-base-12.2.12-139.el7cp.x86_64.rpm
ceph-common-12.2.12-139.el7cp.x86_64.rpm
ceph-debuginfo-12.2.12-139.el7cp.x86_64.rpm
ceph-fuse-12.2.12-139.el7cp.x86_64.rpm
ceph-mds-12.2.12-139.el7cp.x86_64.rpm
ceph-radosgw-12.2.12-139.el7cp.x86_64.rpm
ceph-selinux-12.2.12-139.el7cp.x86_64.rpm
cephmetrics-ansible-2.0.10-1.el7cp.x86_64.rpm
grafana-5.2.4-3.el7cp.x86_64.rpm
libcephfs-devel-12.2.12-139.el7cp.x86_64.rpm
libcephfs2-12.2.12-139.el7cp.x86_64.rpm
librados-devel-12.2.12-139.el7cp.x86_64.rpm
librados2-12.2.12-139.el7cp.x86_64.rpm
libradosstriper1-12.2.12-139.el7cp.x86_64.rpm
librbd-devel-12.2.12-139.el7cp.x86_64.rpm
librbd1-12.2.12-139.el7cp.x86_64.rpm
librgw-devel-12.2.12-139.el7cp.x86_64.rpm
librgw2-12.2.12-139.el7cp.x86_64.rpm
python-cephfs-12.2.12-139.el7cp.x86_64.rpm
python-rados-12.2.12-139.el7cp.x86_64.rpm
python-rbd-12.2.12-139.el7cp.x86_64.rpm
python-rgw-12.2.12-139.el7cp.x86_64.rpm
rbd-mirror-12.2.12-139.el7cp.x86_64.rpm
tcmu-runner-1.4.0-3.el7cp.x86_64.rpm
tcmu-runner-debuginfo-1.4.0-3.el7cp.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-12059
https://access.redhat.com/security/cve/CVE-2020-13379
https://access.redhat.com/security/cve/CVE-2020-27781
https://access.redhat.com/security/cve/CVE-2021-3139
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=nO1M
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=v4X9
-----END PGP SIGNATURE-----