RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1515872 | Issue Tracking Patch Third Party Advisory |
https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/ |
Configurations
History
No history.
Information
Published : 2017-12-20 17:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-16818
Mitre link : CVE-2017-16818
CVE.ORG link : CVE-2017-16818
JSON object : View
Products Affected
redhat
- ceph
fedoraproject
- fedora
CWE
CWE-617
Reachable Assertion