UbuntuUpdates.org

Package "ceph"

Name: ceph

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • metadata server for the ceph distributed file system
  • OCF-compliant resource agents for Ceph
  • Ceph test and benchmarking tools
  • Java library for the Ceph File System

Latest version: 13.2.6-0ubuntu0.19.04.1
Release: disco (19.04)
Level: updates
Repository: universe

Links

Save this URL for the latest version of "ceph": https://www.ubuntuupdates.org/ceph



Other versions of "ceph" in Disco

Repository Area Version
base main 13.2.4+dfsg1-0ubuntu2
base universe 13.2.4+dfsg1-0ubuntu2
security universe 13.2.4+dfsg1-0ubuntu2.1
security main 13.2.4+dfsg1-0ubuntu2.1
updates main 13.2.6-0ubuntu0.19.04.1
proposed universe 13.2.6-0ubuntu0.19.04.2
proposed main 13.2.6-0ubuntu0.19.04.2

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 13.2.6-0ubuntu0.19.04.1 2019-07-10 22:08:17 UTC

  ceph (13.2.6-0ubuntu0.19.04.1) disco; urgency=medium

  * New upstream release (LP: #1831732).
  * d/p/CVE-2018-16889.patch,CVE-2019-3821.patch: Drop, included
    in upstream release.
  * d/p/more-py3-compat.patch: Refresh inline with patches accepted
    upstream.
  * d/p/misc-32-bit-fixes.patch: Misc updates for 32bit type mismatches,
    refresh with accepted patches upstream.
  * d/{librados2,librbd1}.symbols: Misc updates for new point release.

 -- James Page <email address hidden> Fri, 21 Jun 2019 06:31:26 +0100

Source diff to previous version
1831732 [SRU] ceph 13.2.6
CVE-2018-16889 Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files
CVE-2019-3821 A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create mu

Version: 13.2.4+dfsg1-0ubuntu2.1 2019-06-25 13:08:04 UTC

  ceph (13.2.4+dfsg1-0ubuntu2.1) disco-security; urgency=medium

  * SECURITY UPDATE: encryption key leak in log
    - debian/patches/CVE-2018-16889.patch: sanitize customer encryption
      keys from log output in src/rgw/rgw_auth_s3.cc,
      src/rgw/rgw_rest_s3.cc.
    - CVE-2018-16889
  * SECURITY UPDATE: civetweb file descriptor leak
    - debian/patches/CVE-2019-3821.patch: properly close connection in
      src/civetweb/src/civetweb.c.
    - CVE-2019-3821

 -- Marc Deslauriers <email address hidden> Wed, 29 May 2019 11:09:08 -0400

CVE-2018-16889 Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files
CVE-2019-3821 A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create mu



About   -   Send Feedback to @ubuntu_updates