what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2016-2995-01

Red Hat Security Advisory 2016-2995-01
Posted Dec 22, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-2995-01 - Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. Security Fix: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request.

tags | advisory, remote, web, denial of service
systems | linux, redhat
advisories | CVE-2016-9579
SHA-256 | 9286c561a561d081acd703570e66d73ab1604692e3bd219adda20044de65df1a

Red Hat Security Advisory 2016-2995-01

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Ceph Storage 1.3 security and bug fix update
Advisory ID: RHSA-2016:2995-01
Product: Red Hat Ceph Storage
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2995.html
Issue date: 2016-12-21
CVE Names: CVE-2016-9579
=====================================================================

1. Summary:

An update is now available for Red Hat Ceph Storage 1.3. This erratum is
for Red Hat Ceph Storage that runs on Ubuntu 14.04.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Ceph Storage is a scalable, open, software-defined storage platform
that combines the most stable version of the Ceph storage system with a
Ceph management platform, deployment utilities, and support services.

Security Fix(es):

* A flaw was found in the way Ceph Object Gateway would process
cross-origin HTTP requests if the CORS policy was set to allow origin on a
bucket. A remote unauthenticated attacker could use this flaw to cause
denial of service by sending a specially-crafted cross-origin HTTP request.
(CVE-2016-9579)

Bug Fix(es):

* Previously, the radosgw-all Upstart service depended on the ceph-all
service in order to trigger a start operation. In some cases, ceph-all was
not defined on Ceph Object Gateway nodes due to the packaging layout. As a
consequence, radosgw-all did not start on boot unless the ceph package was
also installed. With this update, radosgw-all has been modified to start
according to runlevel in addition to the ceph-all event trigger. As a
result, radosgw-all starts on boot also when the ceph package is not
installed on a node. (BZ#1406047)

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

1403245 - CVE-2016-9579 ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
1406047 - [RGW - Ubuntu] - RGW service doesn't start automatically after reboot

5. References:

https://access.redhat.com/security/cve/CVE-2016-9579
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFYWrqAXlSAg2UNWIIRAvWnAJ9TlDKhX7Ek33PLVLEvYqlGevdMrgCgrCEE
cMbftycjQt/2DqaxP1JY+bQ=
=O5Hu
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close