Source: ceph
Version: 10.2.5-1
Severity: important
Tags: security upstream
Forwarded: http://tracker.ceph.com/issues/23039

Hi,

the following vulnerability was published for ceph.

CVE-2018-7262[0]:
|Malformed HTTP requests handled in rgw_civetweb.cc:RGW::init_env() can
|lead to NULL pointer dereference

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-7262
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7262
[1] http://tracker.ceph.com/issues/23039
[2] https://github.com/ceph/ceph/pull/20488

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to