Important: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update

Synopsis

Important: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update

Type/Severity

Security Advisory: Important

Topic

Updated container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.

Description

Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.

This updated container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux.

Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index

All users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6

For supported configurations, refer to:

https://access.redhat.com/articles/1548993

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le

Fixes

  • BZ - 2181117 - CVE-2023-1410 grafana: Stored XSS in Graphite FunctionDescription tooltip
  • BZ - 2186322 - CVE-2023-1387 grafana: JWT token leak to data source
  • BZ - 2210840 - CVE-2023-2801 grafana: data source proxy race condition
  • BZ - 2210848 - CVE-2023-2183 grafana: missing access control allows test alerts by underprivileged user
  • BZ - 2242803 - CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
  • BZ - 2243296 - CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
  • BZ - 2254041 - CVE-2023-1387 grafana-container: grafana: JWT token leak to data source [ceph-6-default]