SUSE update for ceph



Published: 2022-12-21
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-3979
CWE-ID CWE-327
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
openSUSE Leap Micro
Operating systems & Components / Operating system

SUSE Enterprise Storage
Operating systems & Components / Operating system

SUSE Manager Retail Branch Server
Operating systems & Components / Operating system

SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

SUSE Linux Enterprise Desktop
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

SUSE Manager Server
Operating systems & Components / Operating system

SUSE Manager Proxy
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications
Operating systems & Components / Operating system

SUSE Linux Enterprise Server
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing
Operating systems & Components / Operating system

SUSE Linux Enterprise Module for Basesystem
Operating systems & Components / Operating system

fmt-debugsource
Operating systems & Components / Operating system package or component

ceph-test-debugsource
Operating systems & Components / Operating system package or component

ceph-test-debuginfo
Operating systems & Components / Operating system package or component

ceph-test
Operating systems & Components / Operating system package or component

cephadm
Operating systems & Components / Operating system package or component

ceph-prometheus-alerts
Operating systems & Components / Operating system package or component

ceph-mgr-rook
Operating systems & Components / Operating system package or component

ceph-mgr-modules-core
Operating systems & Components / Operating system package or component

ceph-mgr-k8sevents
Operating systems & Components / Operating system package or component

ceph-mgr-diskprediction-local
Operating systems & Components / Operating system package or component

ceph-mgr-dashboard
Operating systems & Components / Operating system package or component

ceph-mgr-cephadm
Operating systems & Components / Operating system package or component

ceph-grafana-dashboards
Operating systems & Components / Operating system package or component

rbd-nbd-debuginfo
Operating systems & Components / Operating system package or component

rbd-nbd
Operating systems & Components / Operating system package or component

rbd-mirror-debuginfo
Operating systems & Components / Operating system package or component

rbd-mirror
Operating systems & Components / Operating system package or component

rbd-fuse-debuginfo
Operating systems & Components / Operating system package or component

rbd-fuse
Operating systems & Components / Operating system package or component

rados-objclass-devel
Operating systems & Components / Operating system package or component

python3-rgw-debuginfo
Operating systems & Components / Operating system package or component

python3-rgw
Operating systems & Components / Operating system package or component

python3-rbd-debuginfo
Operating systems & Components / Operating system package or component

python3-rbd
Operating systems & Components / Operating system package or component

python3-rados-debuginfo
Operating systems & Components / Operating system package or component

python3-rados
Operating systems & Components / Operating system package or component

python3-cephfs-debuginfo
Operating systems & Components / Operating system package or component

python3-cephfs
Operating systems & Components / Operating system package or component

python3-ceph-common
Operating systems & Components / Operating system package or component

python3-ceph-argparse
Operating systems & Components / Operating system package or component

librgw2-debuginfo
Operating systems & Components / Operating system package or component

librgw2
Operating systems & Components / Operating system package or component

librgw-devel
Operating systems & Components / Operating system package or component

librbd-devel
Operating systems & Components / Operating system package or component

libradospp-devel
Operating systems & Components / Operating system package or component

librados-devel-debuginfo
Operating systems & Components / Operating system package or component

librados-devel
Operating systems & Components / Operating system package or component

libcephfs2-debuginfo
Operating systems & Components / Operating system package or component

libcephfs2
Operating systems & Components / Operating system package or component

libcephfs-devel
Operating systems & Components / Operating system package or component

cephfs-shell
Operating systems & Components / Operating system package or component

ceph-radosgw-debuginfo
Operating systems & Components / Operating system package or component

ceph-radosgw
Operating systems & Components / Operating system package or component

ceph-osd-debuginfo
Operating systems & Components / Operating system package or component

ceph-osd
Operating systems & Components / Operating system package or component

ceph-mon-debuginfo
Operating systems & Components / Operating system package or component

ceph-mon
Operating systems & Components / Operating system package or component

ceph-mgr-debuginfo
Operating systems & Components / Operating system package or component

ceph-mgr
Operating systems & Components / Operating system package or component

ceph-mds-debuginfo
Operating systems & Components / Operating system package or component

ceph-mds
Operating systems & Components / Operating system package or component

ceph-immutable-object-cache-debuginfo
Operating systems & Components / Operating system package or component

ceph-immutable-object-cache
Operating systems & Components / Operating system package or component

ceph-fuse-debuginfo
Operating systems & Components / Operating system package or component

ceph-fuse
Operating systems & Components / Operating system package or component

ceph-common-debuginfo
Operating systems & Components / Operating system package or component

ceph-common
Operating systems & Components / Operating system package or component

ceph-base-debuginfo
Operating systems & Components / Operating system package or component

ceph-base
Operating systems & Components / Operating system package or component

ceph
Operating systems & Components / Operating system package or component

librbd1-debuginfo
Operating systems & Components / Operating system package or component

librbd1
Operating systems & Components / Operating system package or component

librados2-debuginfo
Operating systems & Components / Operating system package or component

librados2
Operating systems & Components / Operating system package or component

libfmt8-debuginfo
Operating systems & Components / Operating system package or component

libfmt8
Operating systems & Components / Operating system package or component

ceph-debugsource
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU66551

Risk: Low

CVSSv3.1: 4 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-3979

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to Ceph volume does not the honour osd_dmcrypt_key_size, resulting in the key length is being incorrectly passed in an encryption algorithm to create a non random key. An attacker with physical access to encrypted device can decrypt data and gain access to sensitive information.

Mitigation

Update the affected package ceph to the latest version.

Vulnerable software versions

openSUSE Leap Micro: 5.2

SUSE Enterprise Storage: 7.1

SUSE Manager Retail Branch Server: 4.2

SUSE Linux Enterprise Micro: 5.1 - 5.2

SUSE Linux Enterprise Desktop: 15-SP3

openSUSE Leap: 15.3

SUSE Manager Server: 4.2

SUSE Manager Proxy: 4.2

SUSE Linux Enterprise Server for SAP Applications: 15-SP3

SUSE Linux Enterprise Server: 15-SP3

SUSE Linux Enterprise High Performance Computing: 15-SP3

SUSE Linux Enterprise Module for Basesystem: 15-SP3

fmt-debugsource: before 8.0.1-150300.7.5.1

ceph-test-debugsource: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-test-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-test: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

cephadm: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-prometheus-alerts: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-rook: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-modules-core: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-k8sevents: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-diskprediction-local: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-dashboard: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-cephadm: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-grafana-dashboards: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-nbd-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-nbd: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-mirror-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-mirror: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-fuse-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rbd-fuse: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

rados-objclass-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rgw-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rgw: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rbd-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rbd: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rados-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-rados: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-cephfs-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-cephfs: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-ceph-common: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

python3-ceph-argparse: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librgw2-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librgw2: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librgw-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librbd-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

libradospp-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librados-devel-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librados-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

libcephfs2-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

libcephfs2: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

libcephfs-devel: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

cephfs-shell: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-radosgw-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-radosgw: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-osd-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-osd: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mon-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mon: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mgr: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mds-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-mds: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-immutable-object-cache-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-immutable-object-cache: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-fuse-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-fuse: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-common-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-common: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-base-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph-base: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

ceph: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librbd1-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librbd1: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librados2-debuginfo: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

librados2: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

libfmt8-debuginfo: before 8.0.1-150300.7.5.1

libfmt8: before 8.0.1-150300.7.5.1

ceph-debugsource: before 16.2.9.536+g41a9f9a5573-150300.6.3.1

External links

http://www.suse.com/support/update/announcement/2022/suse-su-20224501-1/


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###