Bug 1389193 (CVE-2016-8626)
| Summary: | CVE-2016-8626 Ceph: RGW Denial of Service by sending null or specially crafted POST object requests | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Siddharth Sharma <sisharma> | 
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | 
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | aortega, apevec, ayoung, cbodley, ceph-eng-bugs, chrisw, cvsbot-xmlrpc, gmollett, jschluet, kbasil, lhh, lpeer, markmc, mburns, rbryant, rhos-maint, rperiyas, sclewis, sisharma, smanjara, srevivo, tdecacqu, tserlin | 
| Target Milestone: | --- | Keywords: | Security | 
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | RHEL: ceph-0.94.9-7.el7cp Ubuntu: ceph_0.94.9-8redhat1 | Doc Type: | If docs needed, set a value | 
| Doc Text: | A flaw was found in the way Ceph Object Gateway handles POST object requests. An authenticated attacker could launch a denial of service attack by sending null or specially crafted POST object requests. | Story Points: | --- | 
| Clone Of: | Environment: | ||
| Last Closed: | 2016-12-01 22:38:59 UTC | Type: | --- | 
| Regression: | --- | Mount Type: | --- | 
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1389199 | ||
| Bug Blocks: | 1387332, 1389198, 1394936 | ||
| 
        
          Description
        
        
          Siddharth Sharma
        
        
        
        
        
          2016-10-27 07:25:06 UTC
        
       Workaround: 1. By default system will use /etc/init.d/ceph-radosgw stop this service by ~]# /etc/init.d/ceph-radosgw stop 2. Create systemd service, change command line params according to the environment where Ceph radosgw is running. ~]# cat /usr/lib/systemd/system/ceph-rgw.service [Unit] Description=Ceph RGW daemon [Service] Type=forking ExecStart=/bin/radosgw -n client.rgw.$(HOSTNAME REDACTED) Restart=on-abnormal RestartSec=1s [Install] WantedBy=multi-user.target 3. Run systemd service 'ceph-rgw.service' Caveat: It still takes +1-2 sec to get service back online. Attacker has to know bucket-name and for that attacker must be authenticated so if service get a lot of such requests user/attacker can be blocked by revoking access to service. This issue has been addressed in the following products: Red Hat Ceph Storage 2 for Ubuntu 16.04 Via RHSA-2016:2816 https://rhn.redhat.com/errata/RHSA-2016-2816.html This issue has been addressed in the following products: Red Hat Ceph Storage 2 for RHEL 7 Via RHSA-2016:2815 https://rhn.redhat.com/errata/RHSA-2016-2815.html This issue has been addressed in the following products: Red Hat Ceph Storage 1.3 for RHEL 7 Via RHSA-2016:2847 https://rhn.redhat.com/errata/RHSA-2016-2847.html This issue has been addressed in the following products: Red Hat Ceph Storage 1.3 for Ubuntu 14.04 Via RHSA-2016:2848 https://rhn.redhat.com/errata/RHSA-2016-2848.html |