Описание
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| OpenStack Foreman | Ceph | Not affected | ||
| Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse) | Ceph | Not affected | ||
| Red Hat Enterprise Linux OpenStack Platform 6 (Juno) | Ceph | Not affected | ||
| Red Hat Ceph Storage 1.3 for Red Hat Enterprise Linux 7 | ceph | Fixed | RHSA-2016:2847 | 01.12.2016 |
| Red Hat Ceph Storage 1.3 for Ubuntu | Fixed | RHSA-2016:2848 | 01.12.2016 | |
| Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7 | calamari-server | Fixed | RHSA-2016:2815 | 22.11.2016 |
| Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7 | ceph | Fixed | RHSA-2016:2815 | 22.11.2016 |
| Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7 | ceph-deploy | Fixed | RHSA-2016:2815 | 22.11.2016 |
| Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7 | ceph-iscsi-config | Fixed | RHSA-2016:2815 | 22.11.2016 |
| Red Hat Ceph Storage 2 for Red Hat Enterprise Linux 7 | ceph-iscsi-tools | Fixed | RHSA-2016:2815 | 22.11.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
6.3 Medium
CVSS2
Связанные уязвимости
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object ...
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
EPSS
6.5 Medium
CVSS3
6.3 Medium
CVSS2