A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
{ "binaries": [ { "binary_name": "ceph", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-common", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-fs-common", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-fuse", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-mds", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-resource-agents", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "ceph-test", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "libcephfs-dev", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "libcephfs-java", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "libcephfs-jni", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "libcephfs1", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "librados-dev", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "librados2", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "librbd-dev", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "librbd1", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "python-ceph", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "radosgw", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "rbd-fuse", "binary_version": "0.80.11-0ubuntu1.14.04.3" }, { "binary_name": "rest-bench", "binary_version": "0.80.11-0ubuntu1.14.04.3" } ], "availability": "No subscription required" }