The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4238.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Ceph Storage 6.1 bug fix update Advisory ID: RHSA-2025:4238-03 Product: Red Hat Ceph Storage Advisory URL: https://access.redhat.com/errata/RHSA-2025:4238 Issue date: 2025-04-28 Revision: 03 CVE Names: CVE-2024-47191 ==================================================================== Summary: An update is now available for Red Hat Ceph Storage 6.1. Description: Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. These new packages include numerous security and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes: https://docs.redhat.com/en/documentation/red_hat_ceph_storage/6/html/6.1_release_notes/index Solution: https://access.redhat.com/articles/1548993 https://access.redhat.com/articles/11258 CVEs: CVE-2024-47191 References: https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=2164077 https://bugzilla.redhat.com/show_bug.cgi?id=2246440 https://bugzilla.redhat.com/show_bug.cgi?id=2247402 https://bugzilla.redhat.com/show_bug.cgi?id=2257935 https://bugzilla.redhat.com/show_bug.cgi?id=2266793 https://bugzilla.redhat.com/show_bug.cgi?id=2269342 https://bugzilla.redhat.com/show_bug.cgi?id=2271596 https://bugzilla.redhat.com/show_bug.cgi?id=2275475 https://bugzilla.redhat.com/show_bug.cgi?id=2283576 https://bugzilla.redhat.com/show_bug.cgi?id=2290721 https://bugzilla.redhat.com/show_bug.cgi?id=2297966 https://bugzilla.redhat.com/show_bug.cgi?id=2299482 https://bugzilla.redhat.com/show_bug.cgi?id=2300252 https://bugzilla.redhat.com/show_bug.cgi?id=2303084 https://bugzilla.redhat.com/show_bug.cgi?id=2303112 https://bugzilla.redhat.com/show_bug.cgi?id=2303415 https://bugzilla.redhat.com/show_bug.cgi?id=2307933 https://bugzilla.redhat.com/show_bug.cgi?id=2308166 https://bugzilla.redhat.com/show_bug.cgi?id=2314213 https://bugzilla.redhat.com/show_bug.cgi?id=2315686 https://bugzilla.redhat.com/show_bug.cgi?id=2315936 https://bugzilla.redhat.com/show_bug.cgi?id=2317530 https://bugzilla.redhat.com/show_bug.cgi?id=2317562 https://bugzilla.redhat.com/show_bug.cgi?id=2318288 https://bugzilla.redhat.com/show_bug.cgi?id=2321292 https://bugzilla.redhat.com/show_bug.cgi?id=2326137 https://bugzilla.redhat.com/show_bug.cgi?id=2337305 https://bugzilla.redhat.com/show_bug.cgi?id=2337309 https://bugzilla.redhat.com/show_bug.cgi?id=2343973 https://bugzilla.redhat.com/show_bug.cgi?id=2345553 https://bugzilla.redhat.com/show_bug.cgi?id=2345559 https://bugzilla.redhat.com/show_bug.cgi?id=2345561 https://bugzilla.redhat.com/show_bug.cgi?id=2355037 https://bugzilla.redhat.com/show_bug.cgi?id=2357854