Cheers!

Thanks for all the backports and fixes.

Regards,

Webert Lima
DevOps Engineer at MAV Tecnologia
*Belo Horizonte - Brasil*
*IRC NICK - WebertRLZ*


On Wed, Jul 11, 2018 at 1:46 PM Abhishek Lekshmanan <abhis...@suse.com>
wrote:

>
> We're glad to announce v10.2.11 release of the Jewel stable release
> series. This point releases brings a number of important bugfixes and
> has a few important security fixes. This is most likely going to be the
> final Jewel release (shine on you crazy diamond). We thank everyone in
> the community for contributing towards this release and particularly
> want to thank Nathan and Yuri for their relentless efforts in
> backporting and testing this release.
>
> We recommend that all Jewel 10.2.x users upgrade.
>
> Notable Changes
> ---------------
>
> * CVE 2018-1128: auth: cephx authorizer subject to replay attack
> (issue#24836 http://tracker.ceph.com/issues/24836, Sage Weil)
>
> * CVE 2018-1129: auth: cephx signature check is weak (issue#24837
> http://tracker.ceph.com/issues/24837, Sage Weil)
>
> * CVE 2018-10861: mon: auth checks not correct for pool ops (issue#24838
> http://tracker.ceph.com/issues/24838, Jason Dillaman)
>
> * The RBD C API's rbd_discard method and the C++ API's Image::discard
> method
>   now enforce a maximum length of 2GB. This restriction prevents overflow
> of
>   the result code.
>
> * New OSDs will now use rocksdb for omap data by default, rather than
>   leveldb. omap is used by RGW bucket indexes and CephFS directories,
>   and when a single leveldb grows to 10s of GB with a high write or
>   delete workload, it can lead to high latency when leveldb's
>   single-threaded compaction cannot keep up. rocksdb supports multiple
>   threads for compaction, which avoids this problem.
>
> * The CephFS client now catches failures to clear dentries during startup
>   and refuses to start as consistency and untrimmable cache issues may
>   develop. The new option client_die_on_failed_dentry_invalidate (default:
>   true) may be turned off to allow the client to proceed (dangerous!).
>
> * In 10.2.10 and earlier releases, keyring caps were not checked for
> validity,
>   so the caps string could be anything. As of 10.2.11, caps strings are
>   validated and providing a keyring with an invalid caps string to, e.g.,
>   "ceph auth add" will result in an error.
>
> The changelog and the full release notes are at the release blog entry
> at https://ceph.com/releases/v10-2-11-jewel-released/
>
> Getting Ceph
> ------------
> * Git at git://github.com/ceph/ceph.git
> * Tarball at http://download.ceph.com/tarballs/ceph-10.2.11.tar.gz
> * For packages, see http://docs.ceph.com/docs/master/install/get-packages/
> * Release git sha1: e4b061b47f07f583c92a050d9e84b1813a35671e
>
>
> Best,
> Abhishek
>
> --
> SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton,
> HRB 21284 (AG Nürnberg)
> _______________________________________________
> ceph-users mailing list
> ceph-users@lists.ceph.com
> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>
_______________________________________________
ceph-users mailing list
ceph-users@lists.ceph.com
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com

Reply via email to