Hi Gaudenz,

> Gaudenz Steinlin <gaud...@debian.org> writes:
> 
> > Hi 
> >
> > Salvatore Bonaccorso <car...@debian.org> writes:
> >> Hi,
> >>
> >> the following vulnerability was published for ceph.
> >>
> >> CVE-2018-7262[0]:
> >> |Malformed HTTP requests handled in rgw_civetweb.cc:RGW::init_env() can
> >> |lead to NULL pointer dereference
> >
> > Thanks for the information. I backported the upstream fix to the version
> > in stretch and I'm currently in the process of building the package
> > (takes several hours). How do you want me to proceed if the package
> > builds fine and testing does not result in any errors?
> >
> > This may lead to a crash of the RGW process if sent a malformed HTTP
> > header which could result in a denial of service. Does this warrant an
> > upload to security or should this only be fixed via a stable point
> > release? Do you want to review the debdiff before the upload? The
> > debdiff of the test package I'm currently building is attached to this
> > mail.
> 
> Further investigations showed that the versions of Ceph currently in
> Debian are not vulnerable [1]. They contain an older version of the embedded
> webserver in RADOS gateway which does not return NULL pointers on
> malformed HTTP requests. I confirmed this myself and also verified that
> the bug is fixed in the latest upstream release soon to be uploaded to
> Debian. I'm therefore closing this bug.

Thanks for your further investigation on the issue.

Regards,
Salvatore

Reply via email to