ceph: CVE-2016-8626: RGW Denial of Service by sending POST object with null conditions

Related Vulnerabilities: CVE-2016-8626   CVE-2016-9579   CVE-2016-5009   CVE-2016-7031  

Debian Bug report logs - #844200
ceph: CVE-2016-8626: RGW Denial of Service by sending POST object with null conditions

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 13 Nov 2016 10:12:02 UTC

Severity: important

Tags: security, upstream

Found in versions ceph/0.80.11-1.1, ceph/0.80.11-1

Fixed in versions ceph/10.2.5-1, ceph/0.80.7-2+deb8u2

Done: Gaudenz Steinlin <gaudenz@debian.org>

Bug is archived. No further changes may be made.

Forwarded to http://tracker.ceph.com/issues/17635

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Ceph Maintainers <ceph-maintainers@lists.ceph.com>:
Bug#844200; Package src:ceph. (Sun, 13 Nov 2016 10:12:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Ceph Maintainers <ceph-maintainers@lists.ceph.com>. (Sun, 13 Nov 2016 10:12:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ceph: CVE-2016-8626: RGW Denial of Service by sending POST object with null conditions
Date: Sun, 13 Nov 2016 11:09:00 +0100
Source: ceph
Version: 0.80.11-1.1
Severity: important
Tags: security upstream
Forwarded: http://tracker.ceph.com/issues/17635

Hi,

the following vulnerability was published for ceph.

CVE-2016-8626[0]:
RGW Denial of Service by sending POST object with null conditions

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2016-8626
[1] http://tracker.ceph.com/issues/17635
[2] https://bugzilla.novell.com/show_bug.cgi?id=1007217#c2
[3] https://github.com/ceph/ceph/pull/11809
[4] https://github.com/ceph/ceph/pull/11662

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as fixed in versions ceph/10.2.5-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 22 Dec 2016 05:57:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Ceph Maintainers <ceph-maintainers@lists.ceph.com>:
Bug#844200; Package src:ceph. (Thu, 22 Dec 2016 06:09:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Ceph Maintainers <ceph-maintainers@lists.ceph.com>. (Thu, 22 Dec 2016 06:09:06 GMT) (full text, mbox, link).


Message #12 received at 844200@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 844200@bugs.debian.org, 838026@bugs.debian.org, 829661@bugs.debian.org
Subject: Re: Bug#844200: ceph: CVE-2016-8626: RGW Denial of Service by sending POST object with null conditions
Date: Thu, 22 Dec 2016 07:05:07 +0100
Hi

All of those were fixed in 10.2.5-1. Any reason they were not closed
via changelog entry (and referencing the CVE). This would help the
work of the security team immensly.

Regards,
Salvatore



Marked as found in versions ceph/0.80.11-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 22 Dec 2016 13:03:05 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Ceph Maintainers <ceph-maintainers@lists.ceph.com>:
Bug#844200; Package src:ceph. (Sat, 24 Dec 2016 12:30:07 GMT) (full text, mbox, link).


Acknowledgement sent to Gaudenz Steinlin <gaudenz@debian.org>:
Extra info received and forwarded to list. Copy sent to Ceph Maintainers <ceph-maintainers@lists.ceph.com>. (Sat, 24 Dec 2016 12:30:07 GMT) (full text, mbox, link).


Message #19 received at 844200@bugs.debian.org (full text, mbox, reply):

From: Gaudenz Steinlin <gaudenz@debian.org>
To: "Salvatore Bonaccorso" <carnil@debian.org>
Cc: 844200@bugs.debian.org, 838026@bugs.debian.org, 829661@bugs.debian.org
Subject: Sorry for not closing the ceph security reports properly
Date: Sat, 24 Dec 2016 13:19:20 +0100
[Message part 1 (text/plain, inline)]
Hi Salvatore

Thanks for closing these bugs and sorry for not closing these properly.
I'm currently the only one left on the "Ceph maintainers team" and so my
top priority was to at least get something uploaded and through new.
Thus I forgot to check all the bug reports to see which ones were closed
with the new upstream release. Sorry for that and sorry for making the
life of the security harder than necessary.

Which of the bugs do you think also warant an upload to stable?

Gaudenz

-- 
PGP: 836E 4F81 EFBB ADA7 0852 79BF A97A 7702 BAF9 1EF5
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Ceph Maintainers <ceph-maintainers@lists.ceph.com>:
Bug#844200; Package src:ceph. (Sun, 25 Dec 2016 16:54:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Ceph Maintainers <ceph-maintainers@lists.ceph.com>. (Sun, 25 Dec 2016 16:54:06 GMT) (full text, mbox, link).


Message #24 received at 844200@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Gaudenz Steinlin <gaudenz@debian.org>
Cc: 844200@bugs.debian.org, 838026@bugs.debian.org, 829661@bugs.debian.org, team@security.debian.org
Subject: Re: Sorry for not closing the ceph security reports properly
Date: Sun, 25 Dec 2016 17:50:22 +0100
Hi Gaudenz,

Thanks for your reply!

On Sat, Dec 24, 2016 at 01:19:20PM +0100, Gaudenz Steinlin wrote:
> 
> Hi Salvatore
> 
> Thanks for closing these bugs and sorry for not closing these properly.
> I'm currently the only one left on the "Ceph maintainers team" and so my
> top priority was to at least get something uploaded and through new.
> Thus I forgot to check all the bug reports to see which ones were closed
> with the new upstream release. Sorry for that and sorry for making the
> life of the security harder than necessary.

Thanks a lot for the expalantion. I have to admint, my first
impression was that the mails to the (moderated) list do not really go
trough.

> Which of the bugs do you think also warant an upload to stable?

My gut feeling is that none of those would really warrant a DSA, but
I'm Cc'ing the team on that matter, since I'm not too familiar with
ceph itself. As such, and since the jessie point release is already
scheduled for 14th of january, it would be great to see those fixed in
stable via a jessie-pu upload.

Thanks for your work on ceph, and apologies if my initial mail might
have been taken grumpy.

Salvatore



Reply sent to Gaudenz Steinlin <gaudenz@debian.org>:
You have taken responsibility. (Fri, 06 Jan 2017 21:21:31 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 06 Jan 2017 21:21:31 GMT) (full text, mbox, link).


Message #29 received at 844200-close@bugs.debian.org (full text, mbox, reply):

From: Gaudenz Steinlin <gaudenz@debian.org>
To: 844200-close@bugs.debian.org
Subject: Bug#844200: fixed in ceph 0.80.7-2+deb8u2
Date: Fri, 06 Jan 2017 21:17:13 +0000
Source: ceph
Source-Version: 0.80.7-2+deb8u2

We believe that the bug you reported is fixed in the latest version of
ceph, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 844200@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gaudenz Steinlin <gaudenz@debian.org> (supplier of updated ceph package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 28 Dec 2016 10:47:36 +0100
Source: ceph
Binary: ceph ceph-dbg ceph-common ceph-common-dbg ceph-mds ceph-mds-dbg ceph-fuse ceph-fuse-dbg rbd-fuse rbd-fuse-dbg ceph-fs-common ceph-fs-common-dbg ceph-resource-agents librados2 librados2-dbg librados-dev librbd1 librbd1-dbg librbd-dev libcephfs1 libcephfs1-dbg libcephfs-dev radosgw radosgw-dbg rest-bench rest-bench-dbg ceph-test ceph-test-dbg python-ceph libcephfs-java libcephfs-jni libcephfs-jni-dbg
Architecture: source amd64 all
Version: 0.80.7-2+deb8u2
Distribution: jessie
Urgency: medium
Maintainer: Ceph Maintainers <ceph-maintainers@lists.ceph.com>
Changed-By: Gaudenz Steinlin <gaudenz@debian.org>
Description:
 ceph       - distributed storage and file system
 ceph-common - common utilities to mount and interact with a ceph storage cluste
 ceph-common-dbg - debugging symbols for ceph-common
 ceph-dbg   - debugging symbols for ceph
 ceph-fs-common - common utilities to mount and interact with a ceph file system
 ceph-fs-common-dbg - debugging symbols for ceph-fs-common
 ceph-fuse  - FUSE-based client for the Ceph distributed file system
 ceph-fuse-dbg - debugging symbols for ceph-fuse
 ceph-mds   - metadata server for the ceph distributed file system
 ceph-mds-dbg - debugging symbols for ceph-mds
 ceph-resource-agents - OCF-compliant resource agents for Ceph
 ceph-test  - Ceph test and benchmarking tools
 ceph-test-dbg - debugging symbols for ceph-test
 libcephfs-dev - Ceph distributed file system client library (development files)
 libcephfs-java - Java library for the Ceph File System
 libcephfs-jni - Java Native Interface library for CephFS Java bindings
 libcephfs-jni-dbg - debugging symbols for libcephfs-jni
 libcephfs1 - Ceph distributed file system client library
 libcephfs1-dbg - debugging symbols for libcephfs1
 librados-dev - RADOS distributed object store client library (development files)
 librados2  - RADOS distributed object store client library
 librados2-dbg - debugging symbols for librados2
 librbd-dev - RADOS block device client library (development files)
 librbd1    - RADOS block device client library
 librbd1-dbg - debugging symbols for librbd1
 python-ceph - Python libraries for the Ceph distributed filesystem
 radosgw    - REST gateway for RADOS distributed object store
 radosgw-dbg - debugging symbols for radosgw
 rbd-fuse   - FUSE-based rbd client for the Ceph distributed file system
 rbd-fuse-dbg - debugging symbols for rbd-fuse
 rest-bench - RESTful bencher that can be used to benchmark radosgw performance
 rest-bench-dbg - debugging symbols for rest-bench
Closes: 829661 838026 844200 849048
Changes:
 ceph (0.80.7-2+deb8u2) jessie; urgency=medium
 .
   * [78329e] Upstream fix for CVE-2016-9579 (short CORS request)
     (Closes: #849048)
   * [514d48] Upstream fix for CVE-2016-5009 (mon DoS) (Closes: #829661)
   * [7ae81b] Upstream fix for CVE-2016-7031 (anonymous read on ACL)
     (Closes: #838026)
   * [86ac46] Upstream fix for CVE-2016-8626 (RGW DoS) (Closes: #844200)
Checksums-Sha1:
 f7f99a8ee758ddcec57f3ef29a70eb9187ff21dc 4066 ceph_0.80.7-2+deb8u2.dsc
 897f18f62fcae792337d40e555d16e13054eb21f 48716 ceph_0.80.7-2+deb8u2.debian.tar.xz
 50850667f0f4d2e5042e1f8d3ad800deafe02d22 5321042 ceph_0.80.7-2+deb8u2_amd64.deb
 bcae70885f8f13c8a6a2f12771b84af031fef861 95206410 ceph-dbg_0.80.7-2+deb8u2_amd64.deb
 423c7388a791b34c2814ed78d42d625f9a4b42c8 4449598 ceph-common_0.80.7-2+deb8u2_amd64.deb
 97512210622451d4ad1752f730fd61b4284ab4d5 69671448 ceph-common-dbg_0.80.7-2+deb8u2_amd64.deb
 5c892a15e2e16e389f03f260b5e3282bdb019dbb 2214674 ceph-mds_0.80.7-2+deb8u2_amd64.deb
 a168c45132a0abd958aa33cf465af47fa8d120ab 34723712 ceph-mds-dbg_0.80.7-2+deb8u2_amd64.deb
 ea24436838de7f6871d572804d53161ac1903611 1405886 ceph-fuse_0.80.7-2+deb8u2_amd64.deb
 4434fe682e4c4fbcb2f3543764fb36ce8d701529 18330730 ceph-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 ded9b7d7662463a1e3360173af126aef6897e3e3 26066 rbd-fuse_0.80.7-2+deb8u2_amd64.deb
 c397fa855edb0bf311c7de22b21c4ef106525d66 33660 rbd-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 eff4a788d26d2762fdf337ef9ee02b34920cfc14 38788 ceph-fs-common_0.80.7-2+deb8u2_amd64.deb
 3d54ba671ae48f9d1ce6a2ff815eaf4209ec13de 82316 ceph-fs-common-dbg_0.80.7-2+deb8u2_amd64.deb
 ebed414b39a8798ebebae3c110daeb45e9ecec2a 21282 ceph-resource-agents_0.80.7-2+deb8u2_all.deb
 ed2b6d7a7ff58ee0e41a12a0a8887524216fae46 1599682 librados2_0.80.7-2+deb8u2_amd64.deb
 297e03428a5ec603cd94fa31ebc6b742318a0c1d 20689856 librados2-dbg_0.80.7-2+deb8u2_amd64.deb
 791ee9f945fb98d0b885f98be7e94c70b51c0d76 1842630 librados-dev_0.80.7-2+deb8u2_amd64.deb
 7af5eeb0fe6d78a3ce3330f95618d1f5be0a7ef4 361664 librbd1_0.80.7-2+deb8u2_amd64.deb
 1ecc403594d8f6ecae9946fccafc98cf9c8f7a59 4732914 librbd1-dbg_0.80.7-2+deb8u2_amd64.deb
 b334e5e34f7a5e96b3b40e6aa2a25840d1103e39 5297200 librbd-dev_0.80.7-2+deb8u2_amd64.deb
 8ef39e62cf646cbf7e05844fb864c54f98dd2a01 1688886 libcephfs1_0.80.7-2+deb8u2_amd64.deb
 526068b0d27ceb3b97510fb6e84da43f41dfac63 21138198 libcephfs1-dbg_0.80.7-2+deb8u2_amd64.deb
 0e0503026bd0affb170bd60f93c7e852f9ed95ca 24276824 libcephfs-dev_0.80.7-2+deb8u2_amd64.deb
 56a495edae35847bbaeaf6fb3d2cebc286c5699a 1041576 radosgw_0.80.7-2+deb8u2_amd64.deb
 dea7b0e329b73c0600567c85d519cde59b43edd3 18068214 radosgw-dbg_0.80.7-2+deb8u2_amd64.deb
 7e617b34f78523f59f1b9d0d98758b7cf281eaaa 351488 rest-bench_0.80.7-2+deb8u2_amd64.deb
 5bcf3994c4f4c2ee0e7a3928e5699c33a03ee7dc 4662114 rest-bench-dbg_0.80.7-2+deb8u2_amd64.deb
 832f61a7edbc19047fc3b7ef864cb3944a3635f9 16705498 ceph-test_0.80.7-2+deb8u2_amd64.deb
 6b60bc18154b2624ec59ccb623184f0305e28eb7 323295940 ceph-test-dbg_0.80.7-2+deb8u2_amd64.deb
 c0bfe76fca8525e1df1aec9fe36b5db778f81382 48926 python-ceph_0.80.7-2+deb8u2_amd64.deb
 2192ed49d8bffec077ec877266acca931a235572 26548 libcephfs-java_0.80.7-2+deb8u2_all.deb
 c67bc8cdaf6eeeead9dc40405fb830186575be93 46834 libcephfs-jni_0.80.7-2+deb8u2_amd64.deb
 ebd2e2c0b9f177c96348687adffd429744b04810 274370 libcephfs-jni-dbg_0.80.7-2+deb8u2_amd64.deb
Checksums-Sha256:
 b2b24725a4f384e04d5ff343760595e9a800ed6f5e8d7f51c082a1e34e039952 4066 ceph_0.80.7-2+deb8u2.dsc
 95f142de234e6730403922b8ed0db2683a84010ae0b1a5e33ad0ed63678d20cf 48716 ceph_0.80.7-2+deb8u2.debian.tar.xz
 0966d91d208afdee9a7d7ed5c8c1ca49c475db3f248c41efd0e01bced49bd2c8 5321042 ceph_0.80.7-2+deb8u2_amd64.deb
 c2327735672da2d2df139f10ec5f6a176d48bae3c3f8086d25242314493395d5 95206410 ceph-dbg_0.80.7-2+deb8u2_amd64.deb
 0a71a1e3b975cda25f76d39da002f023a644ba4db4519bbe3c0ee287261592f3 4449598 ceph-common_0.80.7-2+deb8u2_amd64.deb
 803931cff1be5e4891dd0146dcc97be9e7af9a291b2bf59d84bf1711f44fd3e0 69671448 ceph-common-dbg_0.80.7-2+deb8u2_amd64.deb
 c2dabf4b1e32dcceebb821b4d1dcce9c61289451aebc0945aea6de145dca49ee 2214674 ceph-mds_0.80.7-2+deb8u2_amd64.deb
 fa7dfcc6c931562bc4d52d28d199816aa7d065cac460ee82987af00573446fc5 34723712 ceph-mds-dbg_0.80.7-2+deb8u2_amd64.deb
 798f7a2cd63fd2495be397c0a7690a9410435a3b84053b611257b40156c694ef 1405886 ceph-fuse_0.80.7-2+deb8u2_amd64.deb
 c8ac6144068e52d65c52e1a1f27f56184e2a5d537f352733a72e0fe1ab5621a0 18330730 ceph-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 e9e5561834ed277fae7ccdab372dff2dabe7a8b507c5dc6c07192a55a2cfa61c 26066 rbd-fuse_0.80.7-2+deb8u2_amd64.deb
 5ee6bcbd67bcbd7fc088a130b98ebbf64142f1baccb8c27a3f46f3f68ea5920f 33660 rbd-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 0a645f3df04d9eadea0cddf719cf975819f968c11bc39a1bd466adde218d80d0 38788 ceph-fs-common_0.80.7-2+deb8u2_amd64.deb
 be3eacd4f9bbb5bc54799baa98bcc7fedb225cecc3b8848b9df035d3e8210530 82316 ceph-fs-common-dbg_0.80.7-2+deb8u2_amd64.deb
 ff1be9be0173ff09699ef5e8f4199b89ce1b80ad30793dba8c606fa523293059 21282 ceph-resource-agents_0.80.7-2+deb8u2_all.deb
 f7a9962c24c546ab00ed26c0635e4463c089e84a7d26106245161362abcae427 1599682 librados2_0.80.7-2+deb8u2_amd64.deb
 fd057f182fcc256a7d9d27ab07d128a7a4a2a31c904c16b6e39db0cc68f8f5fe 20689856 librados2-dbg_0.80.7-2+deb8u2_amd64.deb
 2f8a8db9933ccd502043438ace51b9c47e46d883368918818903b1f1c04f761a 1842630 librados-dev_0.80.7-2+deb8u2_amd64.deb
 392bd6a194c41e1f325d14cb8ff96273231f21133462b90853f4a534c0d0414f 361664 librbd1_0.80.7-2+deb8u2_amd64.deb
 9fcd95dc7cc6800eedffaa2d9ca43abcd276cf9c0705a1b95b7d3654c51606de 4732914 librbd1-dbg_0.80.7-2+deb8u2_amd64.deb
 0f13e00b6886b7501c5229a9bd5d6fcbdb1b29d665d281d2a28b1e5e7510040e 5297200 librbd-dev_0.80.7-2+deb8u2_amd64.deb
 f5987db273814cf344b98150a437bdbcc7499a290be61f0ea139872ece433114 1688886 libcephfs1_0.80.7-2+deb8u2_amd64.deb
 f509c19c44e6016c3cd8ed8a1eda95907fea3382166fdf6c1c45c7e9483b0679 21138198 libcephfs1-dbg_0.80.7-2+deb8u2_amd64.deb
 32096de58332443dd441dd99047f607d3d817f82d4632d04eb77c27c783fc90c 24276824 libcephfs-dev_0.80.7-2+deb8u2_amd64.deb
 7940b3ec1f96fa7f1c86b947f6602a8b42653592b683472acd11a6680d2c61c2 1041576 radosgw_0.80.7-2+deb8u2_amd64.deb
 4480b1ec908ec7957ffdc0aceef1a25f70ff08af706feda7661b1f2552485357 18068214 radosgw-dbg_0.80.7-2+deb8u2_amd64.deb
 878eef2a0031a6d3f5dd84bc33837524b53b9598e63f3283f9f7edc15b230325 351488 rest-bench_0.80.7-2+deb8u2_amd64.deb
 acea0a4efec484154aacae3c22d529dd3aaa9c47961b682b1bf911aba3f32bac 4662114 rest-bench-dbg_0.80.7-2+deb8u2_amd64.deb
 a5b47c1e6a73af7b4b0d2c347cb640f89206faf728add8dd2eea8af7bc852416 16705498 ceph-test_0.80.7-2+deb8u2_amd64.deb
 d235a632a9804f73b8ffda1b661e14c5b2b935d373c63d2a3c70daa816c82313 323295940 ceph-test-dbg_0.80.7-2+deb8u2_amd64.deb
 945d3087bd727e4f11f79fdc7b8fb2a2778b6dfc36e9abc835daecf294f30ed3 48926 python-ceph_0.80.7-2+deb8u2_amd64.deb
 b07e9f4ea427a004192d95894c125cc720890e154322afe30a8fa576ebbde6cb 26548 libcephfs-java_0.80.7-2+deb8u2_all.deb
 6b5a61f2891ce98ee1ead2702e6aeaafd968d07384127622d9c373a616027873 46834 libcephfs-jni_0.80.7-2+deb8u2_amd64.deb
 dae98b5d0c7d4c35ec1b6d267ce30692d5bf45c1bc0b819d12d8b2b9b24c5d07 274370 libcephfs-jni-dbg_0.80.7-2+deb8u2_amd64.deb
Files:
 7da3c38dcb3fc19361312617e776b2c0 4066 admin optional ceph_0.80.7-2+deb8u2.dsc
 c9a289802e8e2f5bba127253612a6c83 48716 admin optional ceph_0.80.7-2+deb8u2.debian.tar.xz
 903c2fa87a5d657ba4124e3781831e2a 5321042 admin optional ceph_0.80.7-2+deb8u2_amd64.deb
 69467a5c15322c348c4ec21e91d73dc9 95206410 debug extra ceph-dbg_0.80.7-2+deb8u2_amd64.deb
 71c4d145ddfd9cfbfd719e61b2a43ecd 4449598 admin optional ceph-common_0.80.7-2+deb8u2_amd64.deb
 c5666a324e71e4b67cfa4cc8fcdd8294 69671448 debug extra ceph-common-dbg_0.80.7-2+deb8u2_amd64.deb
 1e2a7bbe76834bb8e9c9e3d1344aa134 2214674 admin optional ceph-mds_0.80.7-2+deb8u2_amd64.deb
 57aad59dcb81b501500dffa7e9d650b3 34723712 debug extra ceph-mds-dbg_0.80.7-2+deb8u2_amd64.deb
 cb27eef865a2b3b238aa86743647bb0b 1405886 admin optional ceph-fuse_0.80.7-2+deb8u2_amd64.deb
 5d332eccb4b557bbc8df3f7894ca410d 18330730 debug extra ceph-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 4709b19834ee9570040eb8fd4839f804 26066 admin optional rbd-fuse_0.80.7-2+deb8u2_amd64.deb
 3129ef6def23c47267ab7a6a01e52b5c 33660 debug extra rbd-fuse-dbg_0.80.7-2+deb8u2_amd64.deb
 0714a9082c5af59f31202e1ee7bf2072 38788 admin optional ceph-fs-common_0.80.7-2+deb8u2_amd64.deb
 1df1fec07f21f2eb86c0c9313680e502 82316 debug extra ceph-fs-common-dbg_0.80.7-2+deb8u2_amd64.deb
 340c36851a7d039ed8cce3435a1a3bd6 21282 admin extra ceph-resource-agents_0.80.7-2+deb8u2_all.deb
 96c677fba027cf048dd6ea65f624e853 1599682 libs optional librados2_0.80.7-2+deb8u2_amd64.deb
 6255f4556188f7caa5722cb936933ec5 20689856 debug extra librados2-dbg_0.80.7-2+deb8u2_amd64.deb
 14181978fc2658516e69e48caf443591 1842630 libdevel optional librados-dev_0.80.7-2+deb8u2_amd64.deb
 ab813d27ab04d5927c7afc95915a7f76 361664 libs optional librbd1_0.80.7-2+deb8u2_amd64.deb
 71d40772424d285e4692457a438c8027 4732914 debug extra librbd1-dbg_0.80.7-2+deb8u2_amd64.deb
 81fa53e43f18d4f638484e32e24ef3f6 5297200 libdevel optional librbd-dev_0.80.7-2+deb8u2_amd64.deb
 6e178e62d12381fbb3a79607687265c6 1688886 libs optional libcephfs1_0.80.7-2+deb8u2_amd64.deb
 aae806d23a4d96810f5c8e1150751c0d 21138198 debug extra libcephfs1-dbg_0.80.7-2+deb8u2_amd64.deb
 7a5dfdba4ae853dee6e5222965ec0b74 24276824 libdevel optional libcephfs-dev_0.80.7-2+deb8u2_amd64.deb
 71169a3967bca189f4579bdc6618df32 1041576 admin optional radosgw_0.80.7-2+deb8u2_amd64.deb
 4ea671288d3ecf633f720eff57fa3923 18068214 debug extra radosgw-dbg_0.80.7-2+deb8u2_amd64.deb
 b3823b6577d790b99c3a5b48c3cf18cf 351488 admin optional rest-bench_0.80.7-2+deb8u2_amd64.deb
 8aedcd59c515d53a90edb277fb506268 4662114 debug extra rest-bench-dbg_0.80.7-2+deb8u2_amd64.deb
 dc220f1fea9b3003787f533712c99d2c 16705498 admin optional ceph-test_0.80.7-2+deb8u2_amd64.deb
 89cecccc079b7ecc84b23290aa835cd1 323295940 debug extra ceph-test-dbg_0.80.7-2+deb8u2_amd64.deb
 9755dd66618a9a4aa319083ca98f115d 48926 python optional python-ceph_0.80.7-2+deb8u2_amd64.deb
 2935f0e7fe8b3076c15856b0fc939b2e 26548 java optional libcephfs-java_0.80.7-2+deb8u2_all.deb
 06c6eeefb162fde6c7e1a4b48af37936 46834 libs optional libcephfs-jni_0.80.7-2+deb8u2_amd64.deb
 6cb203a08d2bda1afe0d28b7df878d26 274370 debug extra libcephfs-jni-dbg_0.80.7-2+deb8u2_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEXtjbd32AqFIO1HzsOrL5guAQm9UFAlhuDSUACgkQOrL5guAQ
m9Wapwf9EzrAAqNtrq6SPMP7yX5Qd8L2wNN/ekd45W+xtTtAC7yWBJFnvPKMt9HV
55KQg/QZtm/dpaYhVWkOZ0mgc/HT3HeuPqgT/4DrbRqQaws2WP59531eTgG2mqtz
IDPUthpQnsnSouHMsNCIrjuntgw2PVX2++imaBNJlbmeESIFoc6cuEDcJ5TfEdum
in1mMnkcxlnZucvZrxpxdpQgxByf2t/rwd23SOH1QtOSfFU4VQJMPP6Qh4maoQOz
nQJEZrgk/cFhhKc+gfFJXuSb1lSHsJp54LyL4EOirRq9gpB5OiYLqMoY5JJX9RmF
WTsh4PqYAFMT7aA9p9mCjSyq3RYLxA==
=e3V+
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 19 Feb 2017 07:24:41 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:35:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.