{
  "threat_severity" : "Low",
  "public_date" : "2023-10-03T00:00:00Z",
  "bugzilla" : {
    "description" : "ceph: RGW crash upon misconfigured CORS rule",
    "id" : "2215374",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2215374"
  },
  "cvss3" : {
    "cvss3_base_score" : "2.6",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-20",
  "details" : [ "IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated user on the network to cause a denial of service from RGW.  IBM X-Force ID:  268906.", "A flaw was found in Ceph. Certain misconfigurations of CORS rules in Ceph could result in a significantly large memory allocation. This issue can lead to RGW crashing and a denial of service from an authenticated user on the network." ],
  "statement" : "Red Hat Enterprise Linux does not ship RGW, only the associated client libraries. Hence, versions of Ceph shipped in RHEL are not affected by this flaw.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ceph Storage 5.3",
    "release_date" : "2024-02-08T00:00:00Z",
    "advisory" : "RHSA-2024:0745",
    "cpe" : "cpe:/a:redhat:ceph_storage:5.3::el8",
    "package" : "ceph-2:16.2.10-248.el8cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 5.3",
    "release_date" : "2024-02-08T00:00:00Z",
    "advisory" : "RHSA-2024:0745",
    "cpe" : "cpe:/a:redhat:ceph_storage:5.3::el8",
    "package" : "ceph-ansible-0:6.0.28.7-1.el8cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 5.3",
    "release_date" : "2024-02-08T00:00:00Z",
    "advisory" : "RHSA-2024:0745",
    "cpe" : "cpe:/a:redhat:ceph_storage:5.3::el8",
    "package" : "haproxy-0:2.2.19-5.el8cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 6.1",
    "release_date" : "2023-10-12T00:00:00Z",
    "advisory" : "RHSA-2023:5693",
    "cpe" : "cpe:/a:redhat:ceph_storage:6.1::el9",
    "package" : "ceph-2:17.2.6-148.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 6.1",
    "release_date" : "2023-10-12T00:00:00Z",
    "advisory" : "RHSA-2023:5693",
    "cpe" : "cpe:/a:redhat:ceph_storage:6.1::el9",
    "package" : "cephadm-ansible-0:3.0.0-1.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 8.1",
    "release_date" : "2025-06-26T00:00:00Z",
    "advisory" : "RHSA-2025:9775",
    "cpe" : "cpe:/a:redhat:ceph_storage:8.1::el9",
    "package" : "ceph-2:19.2.1-222.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 8.1",
    "release_date" : "2025-06-26T00:00:00Z",
    "advisory" : "RHSA-2025:9775",
    "cpe" : "cpe:/a:redhat:ceph_storage:8.1::el9",
    "package" : "cephadm-ansible-1:4.1.4-1.el9cp"
  }, {
    "product_name" : "Red Hat Ceph Storage 8.1",
    "release_date" : "2025-06-26T00:00:00Z",
    "advisory" : "RHSA-2025:9775",
    "cpe" : "cpe:/a:redhat:ceph_storage:8.1::el9",
    "package" : "oath-toolkit-0:2.6.12-1.el9cp"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Ceph Storage 3",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:3"
  }, {
    "product_name" : "Red Hat Ceph Storage 4",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:ceph_storage:4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Openshift Container Storage 4",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openshift_container_storage:4"
  }, {
    "product_name" : "Red Hat Openshift Data Foundation 4",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openshift_data_foundation:4"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens)",
    "fix_state" : "Not affected",
    "package_name" : "ceph",
    "cpe" : "cpe:/a:redhat:openstack:13"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-46159\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-46159" ],
  "name" : "CVE-2023-46159",
  "csaw" : false
}