Package "ceph-base"

Name: ceph-base


common ceph daemon libraries and management tools

Latest version: 16.2.6-0ubuntu0.21.04.2
Release: hirsute (21.04)
Level: updates
Repository: main
Head package: ceph
Homepage: http://ceph.com/


Download "ceph-base"

Other versions of "ceph-base" in Hirsute

Repository Area Version
base main 16.2.0-0ubuntu1
security main 16.2.6-0ubuntu0.21.04.2


Version: 16.2.6-0ubuntu0.21.04.2 2021-11-01 16:06:20 UTC

  ceph (16.2.6-0ubuntu0.21.04.2) hirsute-security; urgency=medium

  * No change rebuild in -security pocket.

 -- Marc Deslauriers <email address hidden> Wed, 27 Oct 2021 16:00:39 -0400

Source diff to previous version

Version: 16.2.6-0ubuntu0.21.04.1 2021-10-27 20:06:19 UTC

  ceph (16.2.6-0ubuntu0.21.04.1) hirsute; urgency=medium

  [ Frode Nordahl ]
  * d/control: The ISA-L EC plugin changed its build dependency from yasm to
    nasm 2.13.03 or newer (LP: #1940697)

  [ James Page ]
  * New upstream point release (LP: #1943932).

 -- James Page <email address hidden> Sun, 19 Sep 2021 09:29:10 +0100

Source diff to previous version
1940697 missing erasure code plugin library libec_isa.so
1943932 [SRU] ceph 16.2.6

Version: 16.2.4-0ubuntu0.21.04.1 2021-07-14 03:06:39 UTC

  ceph (16.2.4-0ubuntu0.21.04.1) hirsute; urgency=medium

  [ Chris MacNaughton ]
  * d/ceph-base.install: Remove ceph-deploy man page installation
    (LP: #1892448).

  [ James Page ]
  * SECURITY UPDATE: New upstream release (LP: #1928645):
    - CVE-2021-3509: Dashboard XSS via token cookie.
    - CVE-2021-3531: Swift API denial of service.
    - CVE-2021-3531: HTTP header injects via CORS in RGW.
    - d/p/bug1925347.patch: Drop, included in release.

 -- James Page <email address hidden> Thu, 27 May 2021 06:18:16 +0100

Source diff to previous version
1892448 ceph 15.2.3-0ubuntu0.20.04.2 collides with ceph-deploy 2.0.1-0ubuntu1
1928645 [SRU] ceph 16.2.4
CVE-2021-3509 A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to a
CVE-2021-3531 A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes

Version: 16.2.1-0ubuntu0.21.04.1 2021-05-27 11:06:27 UTC

  ceph (16.2.1-0ubuntu0.21.04.1) hirsute-proposed; urgency=medium

  * SECURITY UPDATE: New upstream point release (LP: #1925322):
    - CVE-2021-20288
  * d/rules: remove temporary build objects after install to avoid
    running out of disk space during package builds.
  * d/p/bug1925347.patch: Cherry pick fix to revert ProtectClock
    permissions change in systemd configurations which prevents the
    ceph-osd process from starting (LP: #1925347).

 -- James Page <email address hidden> Thu, 22 Apr 2021 10:21:35 +0100

1925322 [SRU] ceph 16.2.1
1925347 ceph-osd fails to start with ProtectClock=true
CVE-2021-20288 An authentication flaw was found in ceph in versions before 14.2.20. When the monitor handles CEPHX_GET_AUTH_SESSION_KEY requests, it doesn't sanitiz

About   -   Send Feedback to @ubuntu_updates