{"affected":[{"ecosystem_specific":{"binaries":[{"librados2":"16.2.11.58+g38d6afd3b78-150400.3.6.1","librbd1":"16.2.11.58+g38d6afd3b78-150400.3.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"ceph","purl":"pkg:rpm/suse/ceph&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.2.11.58+g38d6afd3b78-150400.3.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ceph fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2022-0670: Fixed user/tenant read/write access to an entire file system (bsc#1201837).\n- CVE-2022-3650: Fixed Python script that allowed privilege escalation from ceph to root (bsc#1204430).\n- CVE-2022-3854: Fixed possible DoS issue in ceph URL processing on RGW backends (bsc#1205025).\n\nBug fixes:\n\n- osd, tools, kv: non-aggressive, on-line trimming of accumulated dups (bsc#1199183).\n- ceph-volume: fix fast device alloc size on mulitple device  (bsc#1200262).\n- cephadm: update monitoring container images (bsc#1200501).\n- mgr/dashboard: prevent alert redirect (bsc#1200978).\n- mgr/volumes: Add subvolumegroup resize cmd (bsc#1201797).\n- monitoring/ceph-mixin: add RGW host to label info (bsc#1201976).\n- mgr/dashboard: enable addition of custom Prometheus alerts (bsc#1202077).\n- python-common: Add 'KB' to supported suffixes in SizeMatcher (bsc#1203375).\n- mgr/dashboard: fix rgw connect when using ssl (bsc#1205436).\n- ceph.spec.in: Add -DFMT_DEPRECATED_OSTREAM to CXXFLAGS (bsc#1202292).\n- cephfs-shell: move source to separate subdirectory (bsc#1201604).\n\nFix in previous release:\n\n- mgr/cephadm: try to get FQDN for configuration files (bsc#1196046).\n- When an RBD is mapped, it is attempted to be deployed as an OSD. (bsc#1187748).\n- OSD marked down causes wrong backfill_toofull (bsc#1188911).\n- cephadm: Fix iscsi client caps (allow mgr <service status> calls) (bsc#1192838).\n- mgr/cephadm: fix and improve osd draining (bsc#1200317).\n- add iscsi and nfs to upgrade process (bsc#1206158).\n- mgr/mgr_module.py: CLICommand: Fix parsing of kwargs arguments (bsc#1192840).\n","id":"SUSE-SU-2023:1581-2","modified":"2023-05-02T13:26:03Z","published":"2023-05-02T13:26:03Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20231581-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1188911"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1192840"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196046"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200262"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200501"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200978"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201604"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201837"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201976"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202077"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203375"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206158"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3854"}],"related":["CVE-2022-0670","CVE-2022-3650","CVE-2022-3854"],"summary":"Security update for ceph","upstream":["CVE-2022-0670","CVE-2022-3650","CVE-2022-3854"]}