First published: Fri Nov 08 2019(Updated: )
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph | ||
Red Hat Ceph Storage | =3.0 | |
Red Hat Ceph Storage | =3.3 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10222 is a vulnerability in the Ceph RGW configuration with Beast as the front end handling client requests.
CVE-2019-10222 has a severity level of 7.5 (high).
CVE-2019-10222 affects Ceph and Red Hat Ceph Storage versions 3.0 and 3.3.
An unauthenticated attacker can crash the Ceph RGW server by sending valid HTTP headers and terminating the connection.
Apply the necessary updates or patches provided by the vendor to mitigate the vulnerability in Ceph RGW.