A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
{
"binaries": [
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-common"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-fs-common"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-fuse"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-mds"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-resource-agents"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "ceph-test"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "libcephfs-dev"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "libcephfs-java"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "libcephfs-jni"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "libcephfs1"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "librados-dev"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "librados2"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "librbd-dev"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "librbd1"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "python-ceph"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "radosgw"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "rbd-fuse"
},
{
"binary_version": "0.80.11-0ubuntu1.14.04.3",
"binary_name": "rest-bench"
}
],
"availability": "No subscription required"
}