UbuntuUpdates.org

Package "ceph-mgr-dashboard"

Name: ceph-mgr-dashboard

Description:

dashboard module for ceph-mgr

Latest version: 15.2.8-0ubuntu0.20.04.1
Release: focal (20.04)
Level: updates
Repository: universe
Head package: ceph
Homepage: http://ceph.com/

Links


Download "ceph-mgr-dashboard"


Other versions of "ceph-mgr-dashboard" in Focal

Repository Area Version
base universe 15.2.1-0ubuntu1
security universe 15.2.7-0ubuntu0.20.04.2

Changelog

Version: 15.2.8-0ubuntu0.20.04.1 2021-03-01 13:06:27 UTC

  ceph (15.2.8-0ubuntu0.20.04.1) focal; urgency=medium

  [ Chris MacNaughton ]
  * New upstream point release (LP: #1912355):
    - d/rules,cephadm.install,librgw-dev.install,librgw2.install: Drop files
      no longer included in point release.
  * d/p/disable-log-slow-requests.patch: Remove logging every slow request
    details to monitors LP: #1909162).

  [ Ponnuvel Palaniyappan ]
  * d/p/bug1911900-fix-scrub-blocking-balancer.patch:
    Prevent scrub from stopping balancer (LP: #1911900)

 -- Ponnuvel Palaniyappan <email address hidden> Thu, 04 Feb 2021 11:28:51 +0000

Source diff to previous version
1912355 [SRU] Ceph 15.2.8
1909162 cluster log slow request spam
1911900 [SRU] Active scrub blocks upmap balancer

Version: 15.2.7-0ubuntu0.20.04.2 2021-01-27 16:06:23 UTC

  ceph (15.2.7-0ubuntu0.20.04.2) focal-security; urgency=medium

  * No-change rebuild in security pocket.
  * SECURITY UPDATE: Authorization bypass vulnerability
    - CVE-2020-10736
    - CVE-2020-25660
  * SECURITY UPDATE: Code injection vulnerability
    - CVE-2020-10753

 -- Paulo Flabiano Smorigo <email address hidden> Wed, 20 Jan 2021 19:09:07 +0000

Source diff to previous version
CVE-2020-10736 An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restri
CVE-2020-25660 A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly a
CVE-2020-10753 A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS

Version: 15.2.7-0ubuntu0.20.04.1 2020-12-08 19:07:18 UTC

  ceph (15.2.7-0ubuntu0.20.04.1) focal; urgency=medium

  * New upstream point release (LP: #1906725).

 -- Corey Bryant <email address hidden> Fri, 04 Dec 2020 11:11:57 -0500

Source diff to previous version
1906725 [SRU] ceph 15.2.7

Version: 15.2.5-0ubuntu0.20.04.1 2020-11-19 12:07:09 UTC

  ceph (15.2.5-0ubuntu0.20.04.1) focal; urgency=medium

  [ Corey Bryant ]
  * d/p/rules: Enable RelWithDebInfo (LP: #1894453).

  [ James Page ]
  * New upstream point release (LP: #1898200).
    - d/p/fix-crash-in-committed-osd-maps.patch: Drop, included upstream.
    - d/libcephfs-dev.install: Drop ceph_statx.h.
    - d/libcephfs-dev.install: Add new header files.

 -- James Page <email address hidden> Mon, 02 Nov 2020 15:18:02 +0000

Source diff to previous version
1894453 Building Ceph packages with RelWithDebInfo
1898200 [SRU] ceph 15.2.5

Version: 15.2.3-0ubuntu0.20.04.2 2020-09-15 21:06:54 UTC

  ceph (15.2.3-0ubuntu0.20.04.2) focal; urgency=medium

  * d/p/fix-crash-in-committed-osd-maps.patch: Fix ceph-osd crash
    when processing osd map updates (LP: #1891567).

 -- Corey Bryant <email address hidden> Fri, 14 Aug 2020 11:46:05 -0400

1891567 [SRU] ceph_osd crash in _committed_osd_maps when failed to encode first inc map



About   -   Send Feedback to @ubuntu_updates