hello Daniel,
>> Please let me know if you'd like me to change anything (here or on
>> #debian-lts), or if I can proceed to upload.
I've taken a look at the proposed package and compared it with the 4
CVEs marked as outstanding against the ceph package currently in LTS.
* CVE-2023-43040: This is
Hi Daniel,
> Please let me know if you'd like me to change anything (here or on
> #debian-lts), or if I can proceed to upload.
Just catching up on this (!). Is this still the preferred and
suggested upload for bullseye LTS, and/or have there been any further
developments? If so, I will review.
Hi Santiago,
thank you for your feedback.
On 12/5/24 16:57, Santiago Ruano Rincón wrote:
>> updates of the last ceph 14 point-release for bullseye:
>
> FTR, the LTS releases don't have point-releases.
yes, I was refering to the last point-release of ceph 14.x.
> If CVE-2024-48916 does not impa
Hello Daniel!
Thanks a lot for preparing this update. However, I have some
comments/questions below:
El 05/12/24 a las 08:03, Daniel Baumann escribió:
> Hi,
>
> although ceph 14 is not affected by the RGW issue from yesterday
> (#1088993, CVE-2024-48916), I have similar to [bookworm] also prepar
Hi,
although ceph 14 is not affected by the RGW issue from yesterday
(#1088993, CVE-2024-48916), I have similar to [bookworm] also prepared
updates of the last ceph 14 point-release for bullseye:
* Changelog:
https://salsa.debian.org/ceph-team/ceph/-/blob/debian/bullseye-security/debian/change