A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "ceph",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-common",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-fs-common",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-fuse",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-mds",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-resource-agents",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "ceph-test",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "libcephfs-dev",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "libcephfs-java",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "libcephfs-jni",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "libcephfs1",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "librados-dev",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "librados2",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "librbd-dev",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "librbd1",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "python-ceph",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "radosgw",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "rbd-fuse",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
},
{
"binary_name": "rest-bench",
"binary_version": "0.80.11-0ubuntu1.14.04.3"
}
]
}