Package "ceph-fuse"

Name: ceph-fuse


FUSE-based client for the Ceph distributed file system

Latest version: 15.2.17-0ubuntu0.20.04.5
Release: focal (20.04)
Level: updates
Repository: universe
Head package: ceph
Homepage: http://ceph.com/


Download "ceph-fuse"

Other versions of "ceph-fuse" in Focal

Repository Area Version
base universe 15.2.1-0ubuntu1
security universe 15.2.17-0ubuntu0.20.04.3


Version: 15.2.17-0ubuntu0.20.04.5 2023-12-05 22:06:51 UTC

  ceph (15.2.17-0ubuntu0.20.04.5) focal; urgency=medium

   * d/p/bluestore-leak-fix.patch: Fix leak in bluestore cache (LP: #1996010).
   * d/p/bail-after-error.patch: Bail after exception in mon (LP: #1969000).
   * d/p/relax-epoch.patch: Relax epoch-based assertions (LP: #2019293).

 -- Luciano Lo Giudice <email address hidden> Fri, 22 Sep 2023 09:21:41 +0100

Source diff to previous version
1969000 [SRU] bail from handle_command() if _generate_command_map() fails
2019293 mgr: relax \

Version: 15.2.17-0ubuntu0.20.04.4 2023-05-18 20:07:13 UTC

  ceph (15.2.17-0ubuntu0.20.04.4) focal; urgency=medium

  * d/p/bug1978913.patch: Cherry-pick upstream fix for on-line
    trim of dups (LP: #1978913).

 -- Nikhil Kshirsagar <email address hidden> Mon, 31 Oct 2022 05:45:04 +0000

Source diff to previous version

Version: 15.2.17-0ubuntu0.20.04.3 2023-05-09 23:07:12 UTC

  ceph (15.2.17-0ubuntu0.20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via ceph crash service
    - debian/patches/CVE-2022-3650-2.patch: fix some flake8 issues in
    - debian/patches/CVE-2022-3650-3.patch: fix stderr handling in
    - debian/patches/CVE-2022-3650-4.patch: drop privleges to run as "ceph"
      user, rather than root in src/ceph-crash.in.
    - debian/patches/CVE-2022-3650-5.patch: chown crash files to ceph user
      in qa/workunits/rados/test_crash.sh.
    - debian/patches/CVE-2022-3650-6.patch: log warning if crash directory
      unreadable in src/ceph-crash.in.
    - CVE-2022-3650
  * This also fixes CVE-2021-3979 and CVE-2022-0670 in the -security

 -- Marc Deslauriers <email address hidden> Wed, 19 Apr 2023 19:05:07 -0400

Source diff to previous version
CVE-2022-3650 A privilege escalation flaw was found in Ceph. Ceph-crash.service allows a local attacker to escalate privileges to root in the form of a crash dump,
CVE-2021-3979 A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algo
CVE-2022-0670 A flaw was found in Openstack manilla owning a Ceph File system "share", which enables the owner to read/write any manilla share or entire file syste

Version: 15.2.17-0ubuntu0.20.04.1 2022-11-23 04:07:19 UTC

  ceph (15.2.17-0ubuntu0.20.04.1) focal; urgency=medium

  * New upstream release (LP: #1990862).
  * Dropped patches in latest release:
    - d/p/disable-log-slow-requests.patch

 -- Chris MacNaughton <email address hidden> Wed, 12 Oct 2022 14:30:58 +0100

Source diff to previous version
1990862 [SRU] ceph 15.2.17

Version: 15.2.16-0ubuntu0.20.04.1 2022-05-03 14:06:25 UTC

  ceph (15.2.16-0ubuntu0.20.04.1) focal; urgency=medium

  [ James Page ]
  * d/control: Correct Breaks/Replaces versioning between -common and -mds
    to resolve issues with upgrades (LP: #1919261).

  [ Chris MacNaughton ]
  * New upstream release (LP: #1964802).
  * Dropped patches in latest relese:
    - d/p/rgw_clear_buckets_before_calling_list_buckets.patch
    - d/p/bug1955345.patch
  * d/p/misc-32-bit-fixes.patch: Refreshed.
  * d/rules, d/ceph-osd.install: Update ceph-osd-smartctl to ceph-smartctl.

 -- James Page <email address hidden> Wed, 30 Mar 2022 13:42:23 +0100

1919261 Upgrading Ceph from 14.2.11-0ubuntu0.19.10.1~cloud4 to 15.2.8-0ubuntu0.20.04.1~cloud0 fails when ceph-mds is installed
1964802 [SRU] ceph 15.2.16

About   -   Send Feedback to @ubuntu_updates