Описание
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 10.2.2-0ubuntu5 |
| esm-infra-legacy/trusty | released | 0.80.11-0ubuntu1.14.04.3 |
| esm-infra/xenial | not-affected | 10.2.2-0ubuntu0.16.04.2 |
| precise | ignored | end of life |
| precise/esm | not-affected | |
| trusty | released | 0.80.11-0ubuntu1.14.04.3 |
| trusty/esm | released | 0.80.11-0ubuntu1.14.04.3 |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
6.8 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object ...
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
6.8 Medium
CVSS2
6.5 Medium
CVSS3