First published: Tue Oct 30 2018(Updated: )
It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ceph | <13.2.4 | 13.2.4 |
Redhat Ceph | <13.2.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
Redhat Ceph Storage | =2.0 | |
Redhat Ceph Storage | =3.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
debian/ceph | 14.2.21-1 16.2.11+ds-2 16.2.15+ds-0+deb12u1 18.2.4+ds-11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-16846.
CVE-2018-16846 has a severity level of medium.
Ceph versions before 13.2.4 are affected by this vulnerability.
Authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
More information about CVE-2018-16846 can be found at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html), [2](https://access.redhat.com/errata/RHSA-2019:2538), [3](https://access.redhat.com/errata/RHSA-2019:2541).