ceph.git
4 months agodebian-armel-armhf-buildflags
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
debian-armel-armhf-buildflags

Gbp-Pq: Name debian-armel-armhf-buildflags.patch

4 months ago[PATCH] os/bluestore/BlueFS: use uint64_t for `len`
Kefu Chai [Fri, 28 Jun 2019 03:35:54 +0000 (11:35 +0800)]
[PATCH] os/bluestore/BlueFS: use uint64_t for `len`

change the type of parameter `len` of `BlueFS::_read_random()` from
`size_t` to `uint64_t`.

i think the type of `size_t` comes from
`rocksdb::RandomAccessFile::Read(uint64_t offset, size_t n,
rocksdb::Slice* result, char* scratch)`. and when we implement this
method, we continued using `n`'s type. but, we are using it with
`std::min()`, for instance, where the template parameter type deduction
fails if the lhs and rhs parameters' types are different. so probaly the
better solution is to use `uint64_t` directly to avoid the the cast and
specializing the template.

Signed-off-by: Kefu Chai <kchai@redhat.com>
Gbp-Pq: Name bluefs-use-uint64_t-for-len.patch

4 months agoAdds max_connections to test display.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to test display.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_test.patch

4 months agoMakes SOMAXCONN user-configurable.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Makes SOMAXCONN user-configurable.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/febab7dc38c9671577603425c54c20f841e27f97
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable.patch

4 months agoAdds max_connections to reference configuration.
Jesse Williamson [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Adds max_connections to reference configuration.

Origin: upstream, https://github.com/civetweb/civetweb/pull/776/commits/3b8eb36676f70d06f8918ccf62029207c49cdda0
Bug: https://github.com/civetweb/civetweb/issues/775
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109

Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ceph/+bug/1838109
Gbp-Pq: Name civetweb-755-1.8-somaxconn-configurable_conf.patch

4 months agoAvoid use of size_t when necessary
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid use of size_t when necessary

Forwarded: no

On 32 bit architectures size_t is not a 64 bit type, which
causes comparison mismatch failures during compilation.

Gbp-Pq: Name 32bit-avoid-size_t.patch

4 months agoAvoid overloading on 32 bit architectures
James Page james.page@ubuntu.com, Bernd Zeimetz [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Avoid overloading on 32 bit architectures

Forwarded: no

unsigned and size_t are equivalent on 32 bit architectures,
so only define the size_t based overload of advance on 64
bit architectures.
https://wiki.debian.org/ArchitectureSpecificsMemo

Gbp-Pq: Name 32bit-avoid-overloading.patch

4 months agodisable-crypto
Ceph Packaging Team [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
disable-crypto

===================================================================

Gbp-Pq: Name disable-crypto.patch

4 months agouse --release 7 instead of -source/-target
Tiago Stürmer Daitx [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
use --release 7 instead of -source/-target

Bug-Ubuntu: https://launchpad.net/bugs/1756854
Bug-Ubuntu: https://launchpad.net/bugs/1766998
Forwarded: no
Last-Update: 2018-04-24

Instead of -source/-target ceph should be build with --release for OpenJDK 9
or later so that the bootclasspath is also set, as per JEP-247, otherwise it
risks incurring into binary incompatibility when run with an earlier OpenJDK.
OpenJDK 11 minimum compatibility release has been updated to 7.
Last-Update: 2018-04-24
Gbp-Pq: Name update-java-source-target-flags.patch

4 months agoceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
ceph (14.2.21-1+deb11u1) bullseye-security; urgency=medium

  [ Thomas Goirand ]

  * CVE-2022-3650: privilege escalation from the ceph user to root. Applied
    upstream patches (Closes: #1024932).

  [ Bastien Roucariès ]
  * CVE-2021-3979:
    A key length flaw was found. An attacker can exploit the
    fact that the key length is incorrectly passed in an
    encryption algorithm to create a non random key,
    which is weaker and can be exploited for loss of
    confidentiality and integrity on encrypted disks.
  * CVE-2023-43040 rgw: Fix bucket validation against POST policies
    (Closes: #1053690)
  * CVE-2025-52555: an unprivileged user can escalate to root
    privileges in a ceph-fuse mounted CephFS by chmod 777
    a directory owned by root to gain access. The result
    of this is that a user could read, write and execute
    to any directory owned by root as long as they chmod
    777 it. This impacts confidentiality, integrity, and availability.
    (Closes: #1108410)

[dgit import unpatched ceph 14.2.21-1+deb11u1]

4 months agoImport ceph_14.2.21-1+deb11u1.debian.tar.xz
Bastien Roucariès [Mon, 22 Sep 2025 20:55:44 +0000 (22:55 +0200)]
Import ceph_14.2.21-1+deb11u1.debian.tar.xz

[dgit import tarball ceph 14.2.21-1+deb11u1 ceph_14.2.21-1+deb11u1.debian.tar.xz]

4 years agoImport ceph_14.2.21.orig.tar.gz
Thomas Goirand [Thu, 27 May 2021 10:04:21 +0000 (12:04 +0200)]
Import ceph_14.2.21.orig.tar.gz

[dgit import orig ceph_14.2.21.orig.tar.gz]