CVE-2015-5245
Published: 3 December 2015
CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.
Priority
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(10.2.2-0ubuntu5)
|
bionic |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
cosmic |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
disco |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
eoan |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
focal |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
groovy |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
hirsute |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Not vulnerable
(0.80.11-0ubuntu1.14.04.2)
|
|
upstream |
Needs triage
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(10.2.2-0ubuntu0.16.04.2)
|
|
yakkety |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
zesty |
Not vulnerable
(10.2.2-0ubuntu5)
|
|
Patches: upstream: https://github.com/ceph/ceph/pull/5430 upstream: https://github.com/ceph/ceph/commit/75d80aa5ce8be83894b6f175bf646f39a4fe24f3 |