Package "ceph"

Name: ceph


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • FUSE-based client for the Ceph distributed file system
  • Ceph daemon for immutable object cache
  • cephadm orchestrator module for ceph-mgr
  • dashboard module for ceph-mgr

Latest version: 15.2.14-0ubuntu0.20.04.2
Release: focal (20.04)
Level: updates
Repository: universe


Other versions of "ceph" in Focal

Repository Area Version
base universe 15.2.1-0ubuntu1
base main 15.2.1-0ubuntu1
security main 15.2.12-0ubuntu0.20.04.1
security universe 15.2.12-0ubuntu0.20.04.1
updates main 15.2.14-0ubuntu0.20.04.2

Packages in group

Deleted packages are displayed in grey.


Version: 15.2.11-0ubuntu0.20.04.2 2021-05-20 09:06:23 UTC

  ceph (15.2.11-0ubuntu0.20.04.2) focal; urgency=medium

  * d/p/bug1914584.patch: Drop as this patch does not fix the actual

Source diff to previous version

Version: 15.2.8-0ubuntu0.20.04.1 2021-03-01 13:06:27 UTC

  ceph (15.2.8-0ubuntu0.20.04.1) focal; urgency=medium

  [ Chris MacNaughton ]
  * New upstream point release (LP: #1912355):
    - d/rules,cephadm.install,librgw-dev.install,librgw2.install: Drop files
      no longer included in point release.
  * d/p/disable-log-slow-requests.patch: Remove logging every slow request
    details to monitors LP: #1909162).

  [ Ponnuvel Palaniyappan ]
  * d/p/bug1911900-fix-scrub-blocking-balancer.patch:
    Prevent scrub from stopping balancer (LP: #1911900)

 -- Ponnuvel Palaniyappan <email address hidden> Thu, 04 Feb 2021 11:28:51 +0000

Source diff to previous version
1912355 [SRU] Ceph 15.2.8
1909162 cluster log slow request spam
1911900 [SRU] Active scrub blocks upmap balancer

Version: 15.2.7-0ubuntu0.20.04.2 2021-01-27 16:06:23 UTC

  ceph (15.2.7-0ubuntu0.20.04.2) focal-security; urgency=medium

  * No-change rebuild in security pocket.
  * SECURITY UPDATE: Authorization bypass vulnerability
    - CVE-2020-10736
    - CVE-2020-25660
  * SECURITY UPDATE: Code injection vulnerability
    - CVE-2020-10753

 -- Paulo Flabiano Smorigo <email address hidden> Wed, 20 Jan 2021 19:09:07 +0000

Source diff to previous version
CVE-2020-10736 An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restri
CVE-2020-25660 A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly a
CVE-2020-10753 A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS

Version: 15.2.7-0ubuntu0.20.04.1 2020-12-08 19:07:18 UTC

  ceph (15.2.7-0ubuntu0.20.04.1) focal; urgency=medium

  * New upstream point release (LP: #1906725).

 -- Corey Bryant <email address hidden> Fri, 04 Dec 2020 11:11:57 -0500

Source diff to previous version
1906725 [SRU] ceph 15.2.7

Version: 15.2.5-0ubuntu0.20.04.1 2020-11-19 12:07:09 UTC

  ceph (15.2.5-0ubuntu0.20.04.1) focal; urgency=medium

  [ Corey Bryant ]
  * d/p/rules: Enable RelWithDebInfo (LP: #1894453).

  [ James Page ]
  * New upstream point release (LP: #1898200).
    - d/p/fix-crash-in-committed-osd-maps.patch: Drop, included upstream.
    - d/libcephfs-dev.install: Drop ceph_statx.h.
    - d/libcephfs-dev.install: Add new header files.

 -- James Page <email address hidden> Mon, 02 Nov 2020 15:18:02 +0000

1894453 Building Ceph packages with RelWithDebInfo
1898200 [SRU] ceph 15.2.5

About   -   Send Feedback to @ubuntu_updates