UbuntuUpdates.org

Package "librgw2"

Name: librgw2

Description:

RADOS Gateway client library

Latest version: 12.2.13-0ubuntu0.18.04.11
Release: bionic (18.04)
Level: updates
Repository: main
Head package: ceph
Homepage: http://ceph.com/

Links


Download "librgw2"


Other versions of "librgw2" in Bionic

Repository Area Version
base main 12.2.4-0ubuntu1
security main 12.2.13-0ubuntu0.18.04.11

Changelog

Version: 12.2.13-0ubuntu0.18.04.5 2020-11-19 12:07:05 UTC

  ceph (12.2.13-0ubuntu0.18.04.5) bionic; urgency=medium

  * d/p/rules: Enable RelWithDebInfo (LP: #1894453).

 -- Corey Bryant <email address hidden> Mon, 26 Oct 2020 09:17:19 -0400

Source diff to previous version
1894453 Building Ceph packages with RelWithDebInfo

Version: 12.2.13-0ubuntu0.18.04.4 2020-09-22 13:06:54 UTC

  ceph (12.2.13-0ubuntu0.18.04.4) bionic-security; urgency=medium

  * SECURITY UPDATE: XSS attacks
    - debian/patches/CVE-2020-1760-1.patch: reject unauthenticated
      response-header actions in src/rgw/rgw_rest_s3.cc.
    - debian/patches/CVE-2020-1760-2.patch: change EPERM to
      ERR_INVALID_REQUEST in src/rgw/rgw_rest_s3.cc.
    - debian/patches/CVE-2020-1760-3.patch: reject control characters in
      response-header actions in src/rgw/rgw_rest_s3.cc.
    - CVE-2020-1760
  * SECURITY UPDATE: HTTP header injection
    - debian/patches/CVE-2020-10753.patch: sanitize newlines in
      src/rgw/rgw_cors.cc.
    - CVE-2020-10753
  * SECURITY UPDATE: DoS via invalid tagging XML
    - debian/patches/CVE-2020-12059.patch: check for tagging element in
      src/rgw/rgw_rest_s3.cc.
    - CVE-2020-12059

 -- Marc Deslauriers <email address hidden> Wed, 09 Sep 2020 08:51:41 -0400

Source diff to previous version
CVE-2020-1760 header-splitting in RGW GetObject has a possible XSS
CVE-2020-10753 A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS
CVE-2020-12059 An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exc

Version: 12.2.13-0ubuntu0.18.04.3 2020-09-03 15:07:02 UTC

  ceph (12.2.13-0ubuntu0.18.04.3) bionic; urgency=medium

  * d/p/bug1868364.patch: fix rgw unable to abort multipart upload after
    the bucket got resharded (LP: #1868364).

 -- Dongdong Tao <email address hidden> Fri, 03 Jul 2020 09:33:20 +0800

Source diff to previous version
1868364 [SRU] rgw: unable to abort multipart upload after the bucket got resharded

Version: 12.2.13-0ubuntu0.18.04.2 2020-06-15 18:07:21 UTC

  ceph (12.2.13-0ubuntu0.18.04.2) bionic; urgency=medium

  * d/p/bug1871820.patch: Revert change in default concurrency for
    rocksdb background compactions to avoid potential data loss
    (LP: #1871820).

Source diff to previous version
1871820 luminous: bluestore rocksdb max_background_compactions regression in 12.2.13

Version: 12.2.12-0ubuntu0.18.04.5 2020-03-17 14:06:29 UTC

  ceph (12.2.12-0ubuntu0.18.04.5) bionic-security; urgency=medium

  * SECURITY UPDATE: DoS via RGW Beast front-end unexpected disconnects
    - debian/patches/CVE-2020-1700.patch: avoid leaking connections in
      src/rgw/rgw_asio_frontend.cc.
    - CVE-2020-1700

 -- Marc Deslauriers <email address hidden> Mon, 10 Feb 2020 11:12:03 -0500

CVE-2020-1700 A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making mult



About   -   Send Feedback to @ubuntu_updates