<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ceph</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0806-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-03-17T14:39:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-03-17T14:39:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-03-17T14:39:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ceph</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update provides Ceph 0.8.11, which fixes the following security issue:

- CVE-2015-5245: A CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw
  or RGW) could allow remote attackers to inject arbitrary HTTP headers and conduct
  HTTP response splitting attacks via a crafted bucket name. (bsc#945206)

The following non-security issues have been fixed:

- Move ceph-rbdnamer binary from package 'ceph' to 'ceph-common'. (bsc#965619)
- Install /usr/bin/radosgw with mode 0750 and owner root:www. (bsc#964907)
- Loop over all ceph-related systemd units on rpm removal. (bsc#941628)
- Perform ceph-disk activate in separate systemd services, rather than in udev directly.
  (bsc#926756)
- Add hyphen to systemctl reload in logrotate.conf to avoid matching ceph.target.
  (bsc#931451)

Ceph 0.8.11 also brings a significant number of bug fixes and enhancements. For a
comprehensive list please refer to the package's change log.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-Storage-1.0-2016-473</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160806-1/</URL>
      <Description>Link for SUSE-SU-2016:0806-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-March/001952.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0806-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/926756</URL>
      <Description>SUSE Bug 926756</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931451</URL>
      <Description>SUSE Bug 931451</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/941628</URL>
      <Description>SUSE Bug 941628</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/945206</URL>
      <Description>SUSE Bug 945206</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/964907</URL>
      <Description>SUSE Bug 964907</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/965619</URL>
      <Description>SUSE Bug 965619</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5245/</URL>
      <Description>SUSE CVE CVE-2015-5245 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 1.0">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 1.0">
        <FullProductName ProductID="SUSE Enterprise Storage 1.0" CPE="cpe:/o:suse:ses:1.0">SUSE Enterprise Storage 1.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ceph-0.80.11-8.1">
      <FullProductName ProductID="ceph-0.80.11-8.1">ceph-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ceph-common-0.80.11-8.1">
      <FullProductName ProductID="ceph-common-0.80.11-8.1">ceph-common-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ceph-fuse-0.80.11-8.1">
      <FullProductName ProductID="ceph-fuse-0.80.11-8.1">ceph-fuse-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ceph-radosgw-0.80.11-8.1">
      <FullProductName ProductID="ceph-radosgw-0.80.11-8.1">ceph-radosgw-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ceph-test-0.80.11-8.1">
      <FullProductName ProductID="ceph-test-0.80.11-8.1">ceph-test-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcephfs1-0.80.11-8.1">
      <FullProductName ProductID="libcephfs1-0.80.11-8.1">libcephfs1-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="librados2-0.80.11-8.1">
      <FullProductName ProductID="librados2-0.80.11-8.1">librados2-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="librbd1-0.80.11-8.1">
      <FullProductName ProductID="librbd1-0.80.11-8.1">librbd1-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-ceph-0.80.11-8.1">
      <FullProductName ProductID="python-ceph-0.80.11-8.1">python-ceph-0.80.11-8.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rbd-fuse-0.80.11-8.1">
      <FullProductName ProductID="rbd-fuse-0.80.11-8.1">rbd-fuse-0.80.11-8.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ceph-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:ceph-0.80.11-8.1">ceph-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="ceph-common-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:ceph-common-0.80.11-8.1">ceph-common-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="ceph-fuse-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:ceph-fuse-0.80.11-8.1">ceph-fuse-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="ceph-radosgw-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:ceph-radosgw-0.80.11-8.1">ceph-radosgw-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="ceph-test-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:ceph-test-0.80.11-8.1">ceph-test-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcephfs1-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:libcephfs1-0.80.11-8.1">libcephfs1-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="librados2-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:librados2-0.80.11-8.1">librados2-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="librbd1-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:librbd1-0.80.11-8.1">librbd1-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-ceph-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:python-ceph-0.80.11-8.1">python-ceph-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="rbd-fuse-0.80.11-8.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:rbd-fuse-0.80.11-8.1">rbd-fuse-0.80.11-8.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.</Note>
    </Notes>
    <CVE>CVE-2015-5245</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 1.0:ceph-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:ceph-common-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:ceph-fuse-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:ceph-radosgw-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:ceph-test-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:libcephfs1-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:librados2-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:librbd1-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:python-ceph-0.80.11-8.1</ProductID>
        <ProductID>SUSE Enterprise Storage 1.0:rbd-fuse-0.80.11-8.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160806-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5245.html</URL>
        <Description>CVE-2015-5245</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945206</URL>
        <Description>SUSE Bug 945206</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
