The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3635.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Ceph Storage 8.0 security, bug fix, and enhancement updates Advisory ID: RHSA-2025:3635-03 Product: Red Hat Ceph Storage Advisory URL: https://access.redhat.com/errata/RHSA-2025:3635 Issue date: 2025-04-07 Revision: 03 CVE Names: CVE-2024-47191 ==================================================================== Summary: An update is now available for Red Hat Ceph Storage 8.0. Description: Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. These new packages include numerous enhancements, bug fixes, and known issues. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes: https://docs.redhat.com/en/documentation/red_hat_ceph_storage/8/html/8.0_release_notes Solution: https://access.redhat.com/articles/1548993 https://access.redhat.com/articles/11258 CVEs: CVE-2024-47191 References: https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=2252403 https://bugzilla.redhat.com/show_bug.cgi?id=2313281 https://bugzilla.redhat.com/show_bug.cgi?id=2322352 https://bugzilla.redhat.com/show_bug.cgi?id=2331338 https://bugzilla.redhat.com/show_bug.cgi?id=2335767 https://bugzilla.redhat.com/show_bug.cgi?id=2342266 https://bugzilla.redhat.com/show_bug.cgi?id=2342728 https://bugzilla.redhat.com/show_bug.cgi?id=2342750 https://bugzilla.redhat.com/show_bug.cgi?id=2342981 https://bugzilla.redhat.com/show_bug.cgi?id=2343514 https://bugzilla.redhat.com/show_bug.cgi?id=2345560 https://bugzilla.redhat.com/show_bug.cgi?id=2345723 https://bugzilla.redhat.com/show_bug.cgi?id=2346194 https://bugzilla.redhat.com/show_bug.cgi?id=2346828 https://bugzilla.redhat.com/show_bug.cgi?id=2347559 https://bugzilla.redhat.com/show_bug.cgi?id=2348396 https://bugzilla.redhat.com/show_bug.cgi?id=2348462 https://bugzilla.redhat.com/show_bug.cgi?id=2348701 https://bugzilla.redhat.com/show_bug.cgi?id=2348728 https://bugzilla.redhat.com/show_bug.cgi?id=2349083 https://bugzilla.redhat.com/show_bug.cgi?id=2349100 https://bugzilla.redhat.com/show_bug.cgi?id=2349102 https://bugzilla.redhat.com/show_bug.cgi?id=2349928 https://bugzilla.redhat.com/show_bug.cgi?id=2350879 https://bugzilla.redhat.com/show_bug.cgi?id=2351003 https://bugzilla.redhat.com/show_bug.cgi?id=2351038 https://bugzilla.redhat.com/show_bug.cgi?id=2351127 https://bugzilla.redhat.com/show_bug.cgi?id=2351205 https://bugzilla.redhat.com/show_bug.cgi?id=2351464 https://bugzilla.redhat.com/show_bug.cgi?id=2351823 https://bugzilla.redhat.com/show_bug.cgi?id=2352781 https://bugzilla.redhat.com/show_bug.cgi?id=2353296 https://bugzilla.redhat.com/show_bug.cgi?id=2353378 https://bugzilla.redhat.com/show_bug.cgi?id=2355038 https://bugzilla.redhat.com/show_bug.cgi?id=2355056 https://bugzilla.redhat.com/show_bug.cgi?id=2355689 https://bugzilla.redhat.com/show_bug.cgi?id=2355790