RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1515872 | Issue Tracking Patch Third Party Advisory |
https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/ |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-12-20T17:00:00
Updated: 2017-12-20T16:57:02
Reserved: 2017-11-14T00:00:00
Link: CVE-2017-16818
JSON object: View
NVD Information
Status : Modified
Published: 2017-12-20T17:29:00.307
Modified: 2023-11-07T02:40:55.363
Link: CVE-2017-16818
JSON object: View
Redhat Information
No data.
CWE