RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/ | Third Party Advisory |
https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1515872 | Issue Tracking Patch Third Party Advisory |
Information
Published : 2017-12-20 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-16818
Mitre link : CVE-2017-16818
JSON object : View
CWE
CWE-617
Reachable Assertion
Products Affected
fedoraproject
- fedora
redhat
- ceph