Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 6. Asynchronous errata updates


This section describes the bug fixes, known issues, and enhancements of the z-stream releases.

6.1. Red Hat Ceph Storage 8.1z1

Red Hat Ceph Storage release 8.1z1 is now available. The security updates and bug fixes that are included in the update are listed in the RHSA-2025:11749 advisory.

6.2. Red Hat Ceph Storage 8.1z2

Red Hat Ceph Storage release 8.1z2 is now available. The bug fixes that are included in the update are listed in the RHBA-2025:14015 and RHBA-2025:13981 advisories.

6.3. Red Hat Ceph Storage 8.1z3

Red Hat Ceph Storage release 8.1z3 is now available. The bug fixes that are included in the update are listed in the RHBA-2025:17047 and RHBA-2025:17048 advisories.

6.3.1. Enhancements

​​​​​​This section lists all the major updates, and enhancements introduced in this release of Red Hat Ceph Storage​​​​.​​​​

6.3.1.1. Ceph Object Gateway

​Enhanced conditional operations

​​​​​​This enhancement introduces support for conditional PUT and DELETE operations, including bulk and multi-delete requests. These conditional operations improve data consistency for some workloads.

Note

​​​​​The conditional ​​​​​​InitMultipartUpload​​​​ is not implemented in this release.

​​​​ Bugzilla:2375001, Bugzilla:2383253

Rate limits now applied for LIST and DELETE request

LIST and DELETE requests are sub-operations of GET and PUT, respectively, but are typically more resource-intensive.

With this enhancement, it is now possible to configure rate limits for LIST and DELETE requests independently or in conjunction with existing GET and PUT rate limits. This provides more flexible granularity in managing system performance and resource usage.

Bugzilla:2389281

6.4. Red Hat Ceph Storage 8.1z4

Red Hat Ceph Storage release 8.1z4 is now available. The bug fixes that are included in the update are listed in the the RHSA-2025:21068 and RHSA-2025:21203 advisories.

6.4.1. Known issues

This section documents known issues found in this release of Red Hat Ceph Storage.

6.4.1.1. The Cephadm utility

QAT cannot be used for TLS offload or acceleration mode together with SSL set

Enabling QAT on HAProxy with SSL enabled injects legacy OpenSSL engine directives. The legacy OpenSSL engine path breaks the TLS handshake, emitting the tlsv1 alert internal error error. With the TLS handshake broken, the TLS termination fails.

As a workaround, disable the QAT at HAProxy in order to keep the TLS handshake. Set the configuration file specifications as follows:

  • haproxy_qat_support: false
  • ssl: true

As a result, QAT is disabled and the HAProxy TLS works as expected.

Note

Under heavy connection rates higher CPU usage may be seen versus QAT-offloaded handshakes.

Bugzilla:2373189

6.5. Red Hat Ceph Storage 8.1z5

Red Hat Ceph Storage release 8.1z5 is now available. This release numerous security updates, bug fixes, and a known issue.

6.5.1. Notable bug fixes

This section describes bugs with significant impact on users that were fixed in this release of Red Hat Ceph Storage. In addition, the section includes descriptions of fixed known issues found in previous versions.

For a full list of bug fixes in this release, see All bug fixes.

6.5.1.1. Ceph File System (CephFS)

The ceph tell command now displays proper error messages for the wrong MDS type​​​​.

​​​​​​ ​​​​​​Previously, the`ceph tell` command did not display a proper error message if the MDS type was incorrect. As a result, the command failed with no error message, and it was difficult to understand what was wrong with the command. ​​​​ ​​​​​​With this fix, the ceph tell command returns an appropriate error message, stating ​​​​​​"unknown <type_name>"​​​ when an incorrect MDS type is used.​​​​

​​​​​​(IBMCEPH-11012)​​​​

​​​​​​Updated subvolume removal workflow to prevent inconsistent states​​​​

​​​​​​ ​​​​​​Previously, removing a subvolume in a full-cluster condition could leave the subvolume in an invalid state.​​​​

​​​​​​With this fix, the subvolume removal workflow has been updated so that metadata is now updated before the UUID directory is moved to the .trash directory. This change ensures that any ENOSPC error is detected during the metadata update, allowing the operation to fail safely and preventing inconsistent state.​​​​

​​​​​​As a result, the system no longer leaves subvolumes in a partially removed or invalid state, and subsequent subvolume operations complete successfully.​​​​

​​​​​​(IBMCEPH-9439)​​​​ ​​​​ .​​​​​​readdr requests now complete successfully with directory listings working as expected ​​​​​​ ​​​​​​Previously, on big-endian systems, a bug in the Ceph MDS caused incorrect encoding of directory fragments. As a result, the CephFS kernel driver received an invalid directory-fragment value. This caused the driver to repeatedly send ​​​​​readdir​​​ requests without completing them. User-initiated ls commands did not finish. ​​​​ ​​​​​​With this fix, the directory-fragment encoding now uses a common endianness format, and the system automatically detects and handles fragments that were created with the previous incorrect encoding.​​​​

​​​​​​(IBMCEPH-12782)​​​​​​​

Early return added to prevent NULL dereference in MDS

Previously, the MDS could crash when a NULL pointer was dereferenced.

With this fix, the logic now returns early when the MDRequestRef is NULL instead of dereferencing it. As a result, crashes caused by this condition are prevented, and MDS stability is improved.

(IBMCEPH-12892)

Improved xattr dump handling to prevent MDS crash

Previously, the MDS could crash when handling xattrs in CInode.cc due to empty bufptr values being dumped.

With this fix, the code now checks whether the buffer contains data before dumping it, and explicitly dumps an empty string when the buffer length is zero. This prevents spurious empty buffer entries and ensures safe handling of xattr values. As a result, xattr dumps are cleaner and more accurate, and the MDS no longer crashes in this scenario.

(IBMCEPH-12738)

6.5.1.2. Ceph Object Gateway (RGW)

​​​​​​Object unlink handling updated for zero-shard configuration​​​​

​​​​​​ ​​​​​​Previously, the system did not correctly handle object unlink operations in specific zero-shard configurations.​​​​

​​​​​​With this fix, the code has been updated to ensure proper handling when both ​​​​​​bucket_index_max_shards​​​​ and the bucket’s num_shards set to ​​​​​0​​​​. As a result, object unlink operations now succeed in this scenario.​​​​ ​​​​​​(IBMCEPH-12702)​​​

Tenant user policy and role-based permissions now work as expected after upgrade

Previously, some policy or role-based permissions involving legacy tenant users behaved differently after upgrading to releases that support IAM accounts. As a result, expected access grants would fail.

With this fix, a configuration option has been introduced to allow backward compatibility with previous version behavior.

​​​​​​(IBMCEPH-12352)​​​

6.5.1.3. RADOS

BlueStore resharding assertion crash fixed for Elastic Shared Blobs

Previously, a bug in BlueStore’s Elastic Shared Blob extent‑resharding logic caused incorrect allocation unit (AU) boundary calculations. During extent map resharding or object deletion, this could trigger the assertion ceph_assert(diff ⇐ bytes_per_au[pos]), causing affected OSDs to crash. This issue primarily impacted OSDs created with bluestore_elastic_shared_blobs=1 and could lead to OSD crash loops, degraded or incomplete placement groups (PGs), and slowed recovery or backfill operations.

With this fix, the AU boundary calculations in the BlueStore resharding logic have been corrected. As a result, OSDs can now process BlueStore resharding and object deletion operations reliably without triggering assertions or crashing. This prevents OSD crash loops, improves PG stability, and allows recovery and backfill operations to complete normally without requiring manual intervention such as PG export/import or OSD redeployment.

(IBMCEPH-12732)

6.5.2. All bug fixes

This section lists a complete listing of all bug fixes in this release of Red Hat Ceph Storage.

Expand
Issue keySeveritySummary

IBMCEPH-10423

Critical

Multisite deployment using rgw module is failing with the timeout error on secondary site

IBMCEPH-12352

Critical

Observing 403 error for multi-part request while other requests like ‘cp’ etc are working fine

IBMCEPH-12686

Critical

Syncing stopped "daemon_health: UNKNOWN" post shutdown and recovery of managed cluster [8.1z]

IBMCEPH-12761

Critical

Shallow Clone does not work as expected when an RWX clone is in progress.

IBMCEPH-12844

Critical

pg_autoscaler is calculating correctly but not implementing PG counts and changes, due to high threshold

IBMCEPH-12877

Critical

A few RBD images report error due to incomplete group snapshots on the secondary cluster after workload deployment [8.1z]

IBMCEPH-11812

Important

MGR crashes during CephFS system test due to assertion failure in src/common/RefCountedObj.cc: 14

IBMCEPH-12433

Important

Accessing RGW ratelimit for user fails with error: failed to get a ratelimit for user id: 'UID', errno: (2) No such file or directory

IBMCEPH-12585

Important

cephadm crashes and doesn’t recover with ganesha-rados-grace tool failed: Failure: -126

IBMCEPH-12705

Important

Observing slow_ops on a mon daemon post site down tests in a 3 AZ cluster

IBMCEPH-12732

Important

OSD crashes with ceph_assert(diff ⇐ bytes_per_au[pos])

IBMCEPH-12738

Important

MDS crassed executing asok_command: dump tree with assert ceph::__ceph_assert_fail(char const*, char const*, int, char const*)

IBMCEPH-12782

Important

Application Pod stays in Init state as the CephFS VolumeAttachment doesn’t complete.

IBMCEPH-12803

Important

unable to see old metrics using loki query after upgrade 6 to 7

IBMCEPH-12816

Important

Stale OLH/plain index entries with pending_removal=true in versioned buckets

IBMCEPH-12828

Important

Unexpected error getting (earmark|encryption tag): error in getxattr: No data available [Errno 61]

IBMCEPH-12867

Important

rbd-mirror daemon restart fails to resume partially synced demote snapshot synchronization on secondary [8.1z]

IBMCEPH-12892

Important

ceph-mds crashed - mds-rank-fin

IBMCEPH-12904

Important

ceph-crash not authenticating with cluster correctly

IBMCEPH-12998

Important

Group replayer shutdown can hang in the face of active m_in_flight_op_tracker ops

IBMCEPH-13000

Important

Bug 2411968 : Group replayer shutdown can hang in the face of active m_in_flight_op_tracker ops [8.1z]

IBMCEPH-13002

Important

RPMInspect fails on executable stack

IBMCEPH-13123

Important

CLONE - radosgw-admin 'bucket rm --bypass-gc' ignores refcount (can lead to DL)

IBMCEPH-7933

Important

mon_memory_target is ignored at startup when set without mon_memory_autotune in the config database

IBMCEPH-9439

Important

Clone In-Progress operations start and error out in a loop.

IBMCEPH-11011

Moderate

Error message is not descriptive for ceph tell command

IBMCEPH-11012

Moderate

Error message is not descriptive for ceph tell command

IBMCEPH-12442

Moderate

Prometheus module error causing cluster to go to HEALTH_ERR

IBMCEPH-12579

Moderate

segmentation fault osd : tick_without_osd_lock()

IBMCEPH-12702

Moderate

When "bucket_index_max_shards" is set to 0 in the zone group , and bucket has num_shards 0 , the "object unlink" fails

6.5.3. Security fixes

This section lists security fixes from this release of Red Hat Ceph Storage.

For details about each CVE, see CVE Records.

  • CVE-2019-10790
  • CVE-2021-23358
  • CVE-2022-34749
  • CVE-2024-31884
  • CVE-2024-51744
  • CVE-2024-55565
  • CVE-2025-7783
  • CVE-2025-12816
  • CVE-2025-26791
  • CVE-2025-47907
  • CVE-2025-47913
  • CVE-2025-52555
  • CVE-2025-58183
  • CVE-2025-66031
  • CVE-2025-66418
  • CVE-2025-66471
  • CVE-2025-68429

6.5.4. Known issues

This section documents known issues found in this release of Red Hat Ceph Storage.

6.5.4.1. Ceph Object Gateway multi-site

Bucket index shows stale metadata after lifecycle expiration in versioned buckets

In rare cases, when lifecycle expiration removes objects from versioned buckets, some omap entries in the bucket index might remain even though the objects have already been removed.

As a result, some omap entries may remain in the bucket index. In cases that many leftover keys accumulate, the following error is emitted: (27) File too large. This inconsistency can affect tools or processes that depend on accurate bucket index listings.

As a workaround:

  1. Scan the bucket for leftover keys:

    radosgw-admin bucket check olh --bucket=BUCKET_NAME --dump-keys --hide-progress
  2. Remove the leftover omap entries.

    radosgw-admin bucket check olh --bucket=BUCKET_NAME --fix

(IBMCEPH-12980)

6.6. Red Hat Ceph Storage 8.1z6

Red Hat Ceph Storage release 8.1z6 is now available. This release numerous security updates, bug fixes, and a known issue.

6.6.1. Notable bug fixes

This section describes bugs with significant impact on users that were fixed in this release of Red Hat Ceph Storage. In addition, the section includes descriptions of fixed known issues found in previous versions.

For a full list of bug fixes in this release, see All bug fixes.

6.6.1.1. Cephadm utility

OSD service counts now report correctly in ceph orch ls

Previously, some OSDs were registered under an incorrect service specification, which caused commands such as ceph orch ls to report inaccurate OSD counts and associations.

With this fix, OSDs are registered only under their correct service specification, and orchestration commands now report accurate OSD service information.

(IBMCEPH-13188)

6.6.1.2. Ceph File System (CephFS)

MDS service stability during journal replay improved

Previously, the MDS service became unavailable during the journal replay phase, interrupting file system operations until the service was manually restarted.

With this fix, the MDS service completes journal replay successfully and remains available.

(IBMCEPH-14093)

Snapshot difference listings now work as expected for large directories

Previously, snapshot difference operations could return incomplete results when files with the same name across different snapshots spanned internal fragment boundaries. As a result, snapdiff output for large directories was unreliable.

With this fix, snapshot difference listings return complete and correct results, providing reliable comparisons for large directories.

(IBMCEPH-11984) ​​​

6.6.1.3. Ceph Object Gateway (RGW)

Lifecycle policy (LC) expiration of delete markers now processes correctly

An issue that caused lifecycle (LC) processing errors on expiration of delete markers with a null versionId has been fixed.

Previously, a key commit required to support LC delete-marker expiration was not backported. Because of this, the LC workflow could not correctly identify delete markers and would skip removing them.

With this fix, a new mechanism has been added to report delete markers by using an object handle or its state. This mechanism is also used in the GET and HEAD paths to permit reporting objects as delete markers.

As a result, LC delete-marker expiration can be applied broadly and to objects created in a versioning-suspended bucket.

Note

Commands, such as awscli list-object-versions also correctly identify delete markers.

(IBMCEPH-13827)

Ceph Object Gateway service stability when processing invalid AssumeRole requests improved

Previously, the Ceph Object Gateway service became unavailable when processing AssumeRole requests with invalid or non-existent role identifiers, interrupting all S3 operations.

With this fix, invalid AssumeRole requests are handled correctly without affecting Ceph Object Gateway service availability.

(IBMCEPH-13657)

Object listing operations now handle large directories correctly

Previously, object listing operations could fail when processing filtered prefixes containing large numbers of objects, preventing users from retrieving complete object listings.

With this fix, object listing operations complete successfully regardless of the number of objects.

(IBMCEPH-13373)

The correct error code is now returned for expired STS tokens in S3 requests

Previously, Ceph Object Gateway returned a 403 (Forbidden) error for requests using expired STS tokens, which did not match the expected behavior.

With this fix, Ceph Object Gateway returns the correct 400 (Bad Request) error code, as defined by AWS S3 specifications.

(IBMCEPH-13201)

Reshard operation completes correctly and no longer inflates bucket index storage

Previously, a defect in unordered bucket listing could cause repeated entry processing or endless loops during resharding, preventing completion and inflating the underlying key-value store.

With this fix, unordered bucket listing functions correctly, allowing reshard operations to complete without excessive bucket index growth.

(IBMCEPH-12991)

​​​​​​Object unlink handling updated for zero-shard configuration​​​​

​​​​​​ ​​​​​​Previously, the system did not correctly handle object unlink operations in specific zero-shard configurations.​​​​

​​​​​​With this fix, the code has been updated to ensure proper handling when both bucket_index_max_shards​​​​ and the bucket’s num_shards set to ​​​​​0​​​​. As a result, object unlink operations now succeed in this scenario.​​​​

​​​​​​(IBMCEPH-12702)​​​

6.6.1.4. Ceph Object Gateway multi-site

Forwarded CreateBucket requests now return the correct error for missing request bodies

Previously, bucket creation requests forwarded between primary and secondary zonegroups could succeed or fail inconsistently instead of returning the expected error.

Users could not create buckets from secondary sites in multisite deployments.

With this fix, CreateBucket requests forwarded from a primary zonegroup to a secondary endpoint, or from a secondary zonegroup to a primary endpoint, now return the correct IllegalLocationConstraintException error.

As a result, bucket creation requests across zonegroups behave consistently and correctly enforce location constraints during forwarding.

(IBMCEPH-12435)

6.6.2. All bug fixes

This section lists a complete listing of all bug fixes in this release of Red Hat Ceph Storage.

Expand
Issue keySeveritySummary

IBMCEPH-10019

Major

Multiple "CephPGImbalance" alerts on Dashboard

IBMCEPH-10025

Major

PG became inactive during Netsplit scenario b/w the two data sites

IBMCEPH-10031

Major

rgw_servers filtering not respected in the RGW Sync Overview -→ Replication(Time) Delta per shard graph in grafana

IBMCEPH-10423

Critical

Multisite deployment using rgw module is failing with the timeout error on secondary site

IBMCEPH-10594

Major

MDS Behind on Trimming persists after increasing mds_log_max_segments

IBMCEPH-11011

Moderate

Error message is not descriptive for ceph tell command

IBMCEPH-11012

Moderate

Error message is not descriptive for ceph tell command

IBMCEPH-11491

Major

Duplicates objects observed even when archive zone is configured to sync from just one zone in a multi-site

IBMCEPH-11603

Major

Switch to non-recursive implementation for directory tree removal.

IBMCEPH-11812

Important

MGR crashes during CephFS system test due to assertion failure in src/common/RefCountedObj.cc: 14

IBMCEPH-11984

Major

Fix snapdiff result fragmentation

IBMCEPH-12352

Critical

Observing 403 error for multi-part request while other requests like 'cp' etc are working fine

IBMCEPH-12433

Important

Accessing RGW ratelimit for user fails with error: failed to get a ratelimit for user id: 'UID', errno: (2) No such file or directory

IBMCEPH-12435

Major

Forwarded CreateBucket missing request body

IBMCEPH-12442

Moderate

Prometheus module error causing cluster to go to HEALTH_ERR

IBMCEPH-12579

Moderate

segmentation fault osd : tick_without_osd_lock()

IBMCEPH-12585

Important

cephadm crashes and doesn’t recover with NFS-rados-grace tool failed: Failure: -126

IBMCEPH-12622

Major

python-cryptography: Use of Vulnerable OpenSSL Library in pyca/cryptography Wheels

IBMCEPH-12624

Major

python-cryptography: Use of Vulnerable OpenSSL Library in pyca/cryptography Wheels

IBMCEPH-12629

Minor

oauthlib: Missing PKCE Enforcement in OAuth2 Authorization Code Flow in oauthlib

IBMCEPH-12686

Critical

Syncing stopped "daemon_health: UNKNOWN" post shutdown and recovery of managed cluster [8.1z]

IBMCEPH-12702

Moderate

When "bucket_index_max_shards" is set to 0 in the zone group , and bucket has num_shards 0 , the "object unlink" fails

IBMCEPH-12705

Important

Observing slow_ops on a mon daemon post site down tests in a 3 AZ cluster

IBMCEPH-12732

Important

OSD crashes with ceph_assert(diff ⇐ bytes_per_au[pos])

IBMCEPH-12738

Important

MDS crassed executing asok_command: dump tree with assert ceph::__ceph_assert_fail(char const*, char const*, int, char const*)

IBMCEPH-12761

Critical

Shallow Clone does not work as expected when an RWX clone is in progress.

IBMCEPH-12782

Important

Application Pod stays in Init state as the CephFS VolumeAttachment doesn’t complete.

IBMCEPH-12785

Major

Fix AdminOps Api GetAccount() and DeleteAccount()

IBMCEPH-12791

Major

Sometimes, when the GW restart very quickly (like redeploy) the discovery port is not released quickly enough

IBMCEPH-12803

Important

unable to see old metrics using loki query after upgrade 6 to 7

IBMCEPH-12816

Important

Stale OLH/plain index entries with pending_removal=true in versioned buckets

IBMCEPH-12821

Major

Replication and application resources stuck during application deletion

IBMCEPH-12828

Important

Unexpected error getting (earmark|encryption tag): error in getxattr: No data available [Errno 61]

IBMCEPH-12844

Critical

pg_autoscaler is calculating correctly but not implementing PG counts and changes, due to high threshold

IBMCEPH-12867

Important

rbd-mirror daemon restart fails to resume partially synced demote snapshot synchronization on secondary [8.1z]

IBMCEPH-12877

Critical

A few RBD images report error due to incomplete group snapshots on the secondary cluster after workload deployment [8.1z]

IBMCEPH-12892

Important

ceph-mds crashed - mds-rank-fin

IBMCEPH-12904

Important

ceph-crash not authenticating with cluster correctly

IBMCEPH-12991

Major

reshard never finishes and inflates k/v store 8.1z6

IBMCEPH-12998

Important

Group replayer shutdown can hang in the face of active m_in_flight_op_tracker ops

IBMCEPH-13000

Important

Group replayer shutdown can hang in the face of active m_in_flight_op_tracker ops [8.1z]

IBMCEPH-13002

Important

RPMInspect fails on executable stack

IBMCEPH-13123

Important

radosgw-admin 'bucket rm --bypass-gc' ignores refcount (can lead to DL)

IBMCEPH-13188

Major

"ceph orch ls" is misreporting the count for OSD services

IBMCEPH-13191

Major

Updated mon_config_key_max_entry_size config change is not being recognized by MONs

IBMCEPH-13201

Major

Backport request of https://ibm-ceph.atlassian.net/browse/IBMCEPH-12310 to 8.1

IBMCEPH-13239

Normal

RGW sync stalled after DBR resharded the bucket on both sides at the same time.

IBMCEPH-13303

Blocker

OSD deployment and startup fails on nodes with high OSD count

IBMCEPH-13354

Normal

Backport request for PR#66367 to 8.1 for GCHQ

IBMCEPH-13373

Normal

treat -EFBIG as advance-and-retry in unordered listing

IBMCEPH-13598

Normal

Backport request for: Config option in 8.1 to enable backward-compatible tenant-model behaviour matching 7.1

IBMCEPH-13599

Normal

Config option in 8.1 to enable backward-compatible tenant-model behaviour matching 7.1

IBMCEPH-13619

Normal

HEAD returns the object but Get requests fails with code 404 for multi-part upload

IBMCEPH-13657

Normal

rgw crashing when an admin user sends an AssumeRole request with an invalid or non-existent RoleArn

IBMCEPH-13691

Blocker

cephadm shell ceph-volume inventory errors out when Thin LVS are created.

IBMCEPH-13741

Normal

MON crashed - need help analyzing dump

IBMCEPH-13755

Normal

403 response for HeadObject operation with s3:GetObject Action

IBMCEPH-13757

Major

HTTP 409 error for Ceph RGW S3 requests

IBMCEPH-13789

Normal

GUI OSD Delete Popup Does not have Option for Preserve OSD ID as Documented

IBMCEPH-13827

Major

Ceph RGW - LC ERROR on expiration of delete marker with null versionId

IBMCEPH-14093

Normal

Ceph MDS is crashing during the journal replay phase.

IBMCEPH-14131

Normal

Replication(Time) Delta per shard showing No Data

IBMCEPH-14292

Normal

Orchestrator is unable to re-deploy DB devices in 8.1 (maybe 8.0 as well)

IBMCEPH-7933

Important

mon_memory_target is ignored at startup when set without mon_memory_autotune in the config database

IBMCEPH-8794

Major

Unable to access dashboard when enabling the "url_prefix" in RHCS 7 dashboard configuration

IBMCEPH-9219

Major

Root_squash is not working as expected with multifs caps

IBMCEPH-9439

Important

Clone In-Progress operations start and error out in a loop.

IBMCEPH-9926

Major

Placement argument with special charaters giving python Assertion error

6.6.3. Security fixes

This section lists security fixes from this release of Red Hat Ceph Storage.

For details about each CVE, see CVE Records.

  • CVE-2021-24032
  • CVE-2023-25153
  • CVE-2023-48795
  • CVE-2024-12905
  • CVE-2024-25621
  • CVE-2025-13033
  • CVE-2025-47914
  • CVE-2025-50181
  • CVE-2025-50182
  • CVE-2025-58181
  • CVE-2025-59343
  • CVE-2025-61729
  • CVE-2025-64718
  • CVE-2025-64756
  • CVE-2025-66418
  • CVE-2025-68156

6.6.4. Known issues

This section documents known issues found in this release of Red Hat Ceph Storage.

6.6.4.1. Ceph build

ceph-common package upgrade fails due to a dependency conflict

Currently, upgrading the ceph-common package from IBM Storage Ceph 8.1z5 to a later version can fail because of a dependency on the libcephfs-daemon package. The libcephfs-daemon package is not included in later releases, which causes the upgrade to fail.

Affected upgrade paths: Upgrades from Red Hat Ceph Storage 8.1z5 to 8.1z6

As a workaround, upgrade the ceph-common package by using the --allowerasing option. When this option is used, the libcephfs-daemon package is removed automatically, and the upgrade proceeds successfully.

(IBMCEPH-13912)

Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat Dokumentation

Legal Notice

Theme

© 2026 Red Hat
Nach oben