rhba-2021_0305
Vulnerability from csaf_redhat
Published
2021-02-01 13:17
Modified
2024-11-22 15:40
Summary
Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.6.2 container bug fix update
Notes
Topic
Updated container images that fix various bugs are now available for Red Hat Openshift Container Storage 4.6.2 from Red Hat Container Registry.
Details
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
This advisory fixes the following bugs:
* Previously, there was a race condition with the Red Hat Ceph Storage PG
autoscaler that caused the creation of 128 PGs instead of the default 32.
This meant RGW pods would fail to come up. With this update, RGW pods would be able to start also in small clusters.
(BZ#1914979)
* Previously, the OSD design had one blocking PodDistributionBudget (PDB) for each OSD. This meant users could only drain one node at a time. OSDs have been redesigned to have one OSD PDB at the beginning which allows only one OSD to go down at a time. Once the OSD goes down, its failure domain is determined, and blocking OSD PDBs are created for other failure domains. The originally created OSD is then deleted, and all of the OSDs can go down in the failure domain. With this new design, multiple nodes can be drained in the same failure domain. (BZ#1916585)
All users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated container images that fix various bugs are now available for Red Hat Openshift Container Storage 4.6.2 from Red Hat Container Registry.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThis advisory fixes the following bugs:\n\n* Previously, there was a race condition with the Red Hat Ceph Storage PG\nautoscaler that caused the creation of 128 PGs instead of the default 32.\nThis meant RGW pods would fail to come up. With this update, RGW pods would be able to start also in small clusters.\n(BZ#1914979)\n\n* Previously, the OSD design had one blocking PodDistributionBudget (PDB) for each OSD. This meant users could only drain one node at a time. OSDs have been redesigned to have one OSD PDB at the beginning which allows only one OSD to go down at a time. Once the OSD goes down, its failure domain is determined, and blocking OSD PDBs are created for other failure domains. The originally created OSD is then deleted, and all of the OSDs can go down in the failure domain. With this new design, multiple nodes can be drained in the same failure domain. (BZ#1916585)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:0305", "url": "https://access.redhat.com/errata/RHBA-2021:0305" }, { "category": "external", "summary": "1899743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899743" }, { "category": "external", "summary": "1914819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914819" }, { "category": "external", "summary": "1914979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914979" }, { "category": "external", "summary": "1916585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916585" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0305.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.6.2 container bug fix update", "tracking": { "current_release_date": "2024-11-22T15:40:59+00:00", "generator": { "date": "2024-11-22T15:40:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2021:0305", "initial_release_date": "2021-02-01T13:17:36+00:00", "revision_history": [ { "date": "2021-02-01T13:17:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-01T13:17:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:40:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product": { "name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Container Storage" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "product": { "name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "product_id": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "product": { "name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "product_id": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "product_id": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "product": { "name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "product_id": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "product_id": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "product": { "name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "product_id": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "product": { "name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "product_id": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "product_id": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "product": { "name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "product_id": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "product_id": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "product": { "name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "product_id": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6" } } }, { "category": "product_version", "name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "product": { "name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "product_id": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6" } } }, { "category": "product_version", "name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "product": { "name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "product_id": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6" } } }, { "category": "product_version", "name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "product": { "name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "product_id": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "product": { "name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "product_id": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1" } } }, { "category": "product_version", "name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "product": { "name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "product_id": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6" } } }, { "category": "product_version", "name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "product": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "product_id": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64" }, "product_reference": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x" }, "product_reference": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x" }, "product_reference": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x" }, "product_reference": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le" }, "product_reference": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le" }, "product_reference": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "relates_to_product_reference": "8Base-RH-OCS-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8", "product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" }, "product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le", "relates_to_product_reference": "8Base-RH-OCS-4.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ilya Dryomov" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-25660", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "discovery_date": "2020-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1890354" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Cephx authentication protocol, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "ceph: CEPHX_V2 replay attack protection lost", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Ceph Storage 3 has already had a fix shipped for this particular flaw. RHCS 4.1 is shipped with CVE-2018-1128 vulnerability reintroduced, affecting msgr 2 protocol.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. Hence, ceph package is no longer used and supported with the release of RHOCS 4.3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25660" }, { "category": "external", "summary": "RHBZ#1890354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660" }, { "category": "external", "summary": "https://ceph.io/community/v15-2-6-octopus-released/", "url": "https://ceph.io/community/v15-2-6-octopus-released/" }, { "category": "external", "summary": "https://ceph.io/releases/v14-2-14-nautilus-released/", "url": "https://ceph.io/releases/v14-2-14-nautilus-released/" } ], "release_date": "2020-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-01T13:17:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0305" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ceph: CEPHX_V2 replay attack protection lost" }, { "cve": "CVE-2020-25677", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "discovery_date": "2020-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1892108" } ], "notes": [ { "category": "description", "text": "A flaw was found in Ceph-ansible where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform 13 ships the flawed code, however RHOSP does not deploy ceph-iscsi-gw role in any supported scenario. For this reason, a ceph-ansible update will not be provided at this time.\n\nRed Hat Ceph Storage 3 and 4 create /etc/ceph/iscsi-gateway.conf with the insecure permissions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25677" }, { "category": "external", "summary": "RHBZ#1892108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892108" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25677", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-01T13:17:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0305" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file" }, { "acknowledgments": [ { "names": [ "Goutham Pacha Ravi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jahson Babel" ], "organization": "Centre de Calcul de l\u0027IN2P3" }, { "names": [ "John Garbutt" ], "organization": "StackHPC" } ], "cve": "CVE-2020-27781", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900109" } ], "notes": [ { "category": "description", "text": "User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even \"admin\" users, compromising the ceph administrator.", "title": "Vulnerability description" }, { "category": "summary", "text": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of ceph package is no longer used and supported with the release of RHOCS 4.3.\n\nRed Hat Enterprise Linux ceph packages do not include the vulnerable component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27781" }, { "category": "external", "summary": "RHBZ#1900109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900109" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-01T13:17:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0305" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ], "known_not_affected": [ "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64", "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64", "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-01T13:17:36+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:0305" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x", "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x", "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.