First published: Thu Nov 03 2022(Updated: )
A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ceph | <17.2.5-0ubuntu0.22.04.3 | 17.2.5-0ubuntu0.22.04.3 |
ubuntu/ceph | <17.2.5-0ubuntu0.22.10.3 | 17.2.5-0ubuntu0.22.10.3 |
Redhat Ceph Storage | =3.0 | |
Redhat Ceph Storage | =4.0 | |
Redhat Ceph Storage | =5.0 | |
debian/ceph | 12.2.11+dfsg1-2.1 12.2.11+dfsg1-2.1+deb10u1 14.2.21-1 16.2.11+ds-2 16.2.11+ds-5 18.2.1+ds-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3854 is a vulnerability found in Ceph relating to the URL processing on RGW backends, which can be exploited by an attacker to crash the RGW and cause a denial of service.
CVE-2022-3854 affects Ceph by allowing an attacker to exploit the URL processing on RGW backends, leading to a denial of service.
The severity of CVE-2022-3854 is medium, with a severity value of 6.5.
To fix CVE-2022-3854 in Ubuntu, update to version 17.2.5-0ubuntu0.22.04.3 for Ubuntu 22.04 or version 17.2.5-0ubuntu0.22.10.3 for Ubuntu 22.10.
To fix CVE-2022-3854 in Debian, update to version 12.2.11+dfsg1-2.1, 12.2.11+dfsg1-2.1+deb10u1, 14.2.21-1, 16.2.11+ds-2, or 16.2.11+ds-5 of the ceph package.