A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service.
[
{
"vendor": "n/a",
"product": "ceph",
"versions": [
{
"version": "As shipped with Red Hat Ceph 3, 4, and 5.",
"status": "affected"
}
]
}
]