First published: Thu Apr 29 2021(Updated: )
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ceph | <14.2.21 | 14.2.21 |
Redhat Ceph | <14.2.21 | |
Redhat Ceph Storage | =4.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3531 is medium with a CVSS score of 5.3.
CVE-2021-3531 can cause the Red Hat Ceph Storage RGW to crash, resulting in a denial of service.
Versions before 14.2.21 of Red Hat Ceph Storage RGW are affected by CVE-2021-3531.
To fix CVE-2021-3531, update Red Hat Ceph Storage RGW to version 14.2.21 or later.
You can find more information about CVE-2021-3531 on the following references: [https://%3crgw-url%3e/swift/v1/AUTH_a1c6e2f79c4b412f9e0335bc6120aeae/foo/](https://%3crgw-url%3e/swift/v1/AUTH_a1c6e2f79c4b412f9e0335bc6120aeae/foo/), [https://%3crgw-url%3e/swift/v1/AUTH_a1c6e2f79c4b412f9e0335bc6120aeae/foo/?abc](https://%3crgw-url%3e/swift/v1/AUTH_a1c6e2f79c4b412f9e0335bc6120aeae/foo/?abc), [https://github.com/ceph/ceph/commit/f44a8ae8aa27ecef69528db9aec220f12492810e](https://github.com/ceph/ceph/commit/f44a8ae8aa27ecef69528db9aec220f12492810e).