The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4664.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Ceph Storage 7.1 security, bug fix, and enhancement updates Advisory ID: RHSA-2025:4664-03 Product: Red Hat Ceph Storage Advisory URL: https://access.redhat.com/errata/RHSA-2025:4664 Issue date: 2025-05-07 Revision: 03 CVE Names: CVE-2023-23934 ==================================================================== Summary: An update is now available for Red Hat Ceph Storage 7.1. Description: Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. These new packages include numerous enhancements, bug fixes, and known issues. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes: https://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes Solution: https://access.redhat.com/articles/1548993 https://access.redhat.com/articles/11258 CVEs: CVE-2023-23934 References: https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=2252788 https://bugzilla.redhat.com/show_bug.cgi?id=2270948 https://bugzilla.redhat.com/show_bug.cgi?id=2284356 https://bugzilla.redhat.com/show_bug.cgi?id=2312113 https://bugzilla.redhat.com/show_bug.cgi?id=2314387 https://bugzilla.redhat.com/show_bug.cgi?id=2315596 https://bugzilla.redhat.com/show_bug.cgi?id=2315885 https://bugzilla.redhat.com/show_bug.cgi?id=2321291 https://bugzilla.redhat.com/show_bug.cgi?id=2348763 https://bugzilla.redhat.com/show_bug.cgi?id=2348935 https://bugzilla.redhat.com/show_bug.cgi?id=2348945 https://bugzilla.redhat.com/show_bug.cgi?id=2348968 https://bugzilla.redhat.com/show_bug.cgi?id=2348970 https://bugzilla.redhat.com/show_bug.cgi?id=2349078 https://bugzilla.redhat.com/show_bug.cgi?id=2349723 https://bugzilla.redhat.com/show_bug.cgi?id=2351271 https://bugzilla.redhat.com/show_bug.cgi?id=2351465 https://bugzilla.redhat.com/show_bug.cgi?id=2352965 https://bugzilla.redhat.com/show_bug.cgi?id=2356050 https://bugzilla.redhat.com/show_bug.cgi?id=2356542 https://bugzilla.redhat.com/show_bug.cgi?id=2357889 https://bugzilla.redhat.com/show_bug.cgi?id=2358123 https://bugzilla.redhat.com/show_bug.cgi?id=2358562 https://bugzilla.redhat.com/show_bug.cgi?id=2360911 https://bugzilla.redhat.com/show_bug.cgi?id=2362258