First published: Tue Nov 21 2017(Updated: )
A flaw was discovered in ceph. Assertion in rgw_iam_policy.cc can be reached by user input and fail through data passed in from a rest call causing it to crash. Upstream patch: <a href="https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a">https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Ceph | >=12.1.0<=12.2.1 | |
Fedoraproject Fedora | =27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16818 is a vulnerability in RADOS Gateway in Ceph 12.1.0 through 12.2.1 that allows remote authenticated users to cause a denial of service (assertion failure and application exit).
An attacker can exploit CVE-2017-16818 by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API.
CVE-2017-16818 has a severity rating of medium (6.5).
CVE-2017-16818 affects Red Hat Ceph versions 12.1.0 through 12.2.1 and Fedora 27.
To fix CVE-2017-16818, users should upgrade to a version of RADOS Gateway that is not affected by the vulnerability.