~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2018-7262

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2018-7262
2
 
PublicDate: 2018-03-19
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7262
5
 
Description:
6
 
 In Ceph before 12.2.3 and 13.x through 13.0.1, the rgw_civetweb.cc
7
 
 RGWCivetWeb::init_env function in radosgw doesn't handle malformed HTTP
8
 
 headers properly, allowing for denial of service.
9
 
Ubuntu-Description:
10
 
Notes:
11
 
 debian> Debian up to 10.2.5-7.2 is not vulnerable as they contain an older
12
 
 debian> version of the embedded webserver in RADOS gateway which does not
13
 
 debian> return null strings on malformed HTTP requests.
14
 
Bugs:
15
 
 http://tracker.ceph.com/issues/23039
16
 
 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891963
17
 
Priority: medium
18
 
Discovered-by:
19
 
Assigned-to:
20
 
 
21
 
 
22
 
Patches_ceph:
23
 
 upstream: https://github.com/ceph/ceph/pull/20403 (superseded)
24
 
 upstream: https://github.com/ceph/ceph/pull/20488
25
 
upstream_ceph: needs-triage
26
 
precise/esm_ceph: not-affected
27
 
trusty_ceph: not-affected
28
 
xenial_ceph: not-affected
29
 
artful_ceph: not-affected
30
 
devel_ceph: not-affected (12.2.4-0ubuntu1)