First published: Fri Nov 08 2019(Updated: )
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph Ceph | ||
Redhat Ceph Storage | =3.0 | |
Redhat Ceph Storage | =3.3 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10222 is a vulnerability in the Ceph RGW configuration with Beast as the front end handling client requests.
CVE-2019-10222 has a severity level of 7.5 (high).
CVE-2019-10222 affects Ceph and Red Hat Ceph Storage versions 3.0 and 3.3.
An unauthenticated attacker can crash the Ceph RGW server by sending valid HTTP headers and terminating the connection.
Apply the necessary updates or patches provided by the vendor to mitigate the vulnerability in Ceph RGW.