The following advisory data is extracted from:
https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0745.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
- Packet Storm Staff
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Ceph Storage 5.3 Security update
Advisory ID: RHSA-2024:0745-03
Product: Red Hat Ceph Storage
Advisory URL: https://access.redhat.com/errata/RHSA-2024:0745
Issue date: 2024-02-09
Revision: 03
CVE Names: CVE-2023-43040
====================================================================
Summary:
An update is now available for Red Hat Ceph Storage 5.3 in the Red Hat
Ecosystem Catalog.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.
These updated packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Ceph Storage Release Notes for information on the most
significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/5.3/html/release_notes/index
All users of Red Hat Ceph Storage are advised to update to these packages
that provide various bug fixes.
Security Fix(es):
* rgw: improperly verified POST keys (CVE-2023-43040)
* ceph: RGW crash upon misconfigured CORS rule (CVE-2023-46159)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/5/html-single/upgrade_guide/index#upgrade-a-red-hat-ceph-storage-cluster-using-cephadm
https://access.redhat.com/articles/1548993
CVEs:
CVE-2023-43040
References:
https://access.redhat.com/security/updates/classification/#moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2153448
https://bugzilla.redhat.com/show_bug.cgi?id=2193419
https://bugzilla.redhat.com/show_bug.cgi?id=2211758
https://bugzilla.redhat.com/show_bug.cgi?id=2215374
https://bugzilla.redhat.com/show_bug.cgi?id=2215380
https://bugzilla.redhat.com/show_bug.cgi?id=2216855
https://bugzilla.redhat.com/show_bug.cgi?id=2216857
https://bugzilla.redhat.com/show_bug.cgi?id=2224636
https://bugzilla.redhat.com/show_bug.cgi?id=2227806
https://bugzilla.redhat.com/show_bug.cgi?id=2227810
https://bugzilla.redhat.com/show_bug.cgi?id=2227997
https://bugzilla.redhat.com/show_bug.cgi?id=2228001
https://bugzilla.redhat.com/show_bug.cgi?id=2228039
https://bugzilla.redhat.com/show_bug.cgi?id=2231469
https://bugzilla.redhat.com/show_bug.cgi?id=2232164
https://bugzilla.redhat.com/show_bug.cgi?id=2233444
https://bugzilla.redhat.com/show_bug.cgi?id=2233886
https://bugzilla.redhat.com/show_bug.cgi?id=2234610
https://bugzilla.redhat.com/show_bug.cgi?id=2236190
https://bugzilla.redhat.com/show_bug.cgi?id=2237391
https://bugzilla.redhat.com/show_bug.cgi?id=2237880
https://bugzilla.redhat.com/show_bug.cgi?id=2238665
https://bugzilla.redhat.com/show_bug.cgi?id=2239149
https://bugzilla.redhat.com/show_bug.cgi?id=2239433
https://bugzilla.redhat.com/show_bug.cgi?id=2239455
https://bugzilla.redhat.com/show_bug.cgi?id=2240089
https://bugzilla.redhat.com/show_bug.cgi?id=2240144
https://bugzilla.redhat.com/show_bug.cgi?id=2240586
https://bugzilla.redhat.com/show_bug.cgi?id=2240727
https://bugzilla.redhat.com/show_bug.cgi?id=2240839
https://bugzilla.redhat.com/show_bug.cgi?id=2240977
https://bugzilla.redhat.com/show_bug.cgi?id=2244868
https://bugzilla.redhat.com/show_bug.cgi?id=2245335
https://bugzilla.redhat.com/show_bug.cgi?id=2245699
https://bugzilla.redhat.com/show_bug.cgi?id=2247232
https://bugzilla.redhat.com/show_bug.cgi?id=2248825
https://bugzilla.redhat.com/show_bug.cgi?id=2249014
https://bugzilla.redhat.com/show_bug.cgi?id=2249017
https://bugzilla.redhat.com/show_bug.cgi?id=2249565
https://bugzilla.redhat.com/show_bug.cgi?id=2249571
https://bugzilla.redhat.com/show_bug.cgi?id=2251768
https://bugzilla.redhat.com/show_bug.cgi?id=2252781
https://bugzilla.redhat.com/show_bug.cgi?id=2253672
https://bugzilla.redhat.com/show_bug.cgi?id=2255035
https://bugzilla.redhat.com/show_bug.cgi?id=2255436
https://bugzilla.redhat.com/show_bug.cgi?id=2256172
https://bugzilla.redhat.com/show_bug.cgi?id=2257421
https://bugzilla.redhat.com/show_bug.cgi?id=2259297