CVE-2020-12059
Summary
| CVE | CVE-2020-12059 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-04-22 13:15:00 UTC |
| Updated | 2023-10-23 19:15:00 UTC |
| Description | An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] [DLA 3629-1] ceph security update |
MLIST |
lists.debian.org |
|
| USN-4528-1: Ceph vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| Bug 1170170 – VUL-0: ceph: specially crafted XML payload on POST requests can crash RGW leading to DOS |
MISC |
bugzilla.suse.com |
Issue Tracking, Patch, Third Party Advisory |
| Bug #44967: rgw:rgw crash when putting object tagging and post object with malformedXML - rgw - Ceph |
MISC |
tracker.ceph.com |
Vendor Advisory |
| 13.1.0 — Ceph Documentation |
MISC |
docs.ceph.com |
Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 6000278 Debian Security Update for ceph (DLA 3629-1)