First published: Fri Jan 31 2020(Updated: )
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph Ceph | ||
Redhat Openshift Container Storage | =4.2 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
ubuntu/ceph | <12.2.12-0ubuntu0.18.04.5 | 12.2.12-0ubuntu0.18.04.5 |
ubuntu/ceph | <14.2.4-0ubuntu0.19.10.2 | 14.2.4-0ubuntu0.19.10.2 |
ubuntu/ceph | <14.2.7-1 | 14.2.7-1 |
debian/ceph | 14.2.21-1 16.2.11+ds-2 18.2.4+ds-3 18.2.4+ds-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1700 is a vulnerability that allows an authenticated attacker to abuse the way the Ceph RGW Beast front-end handles unexpected disconnects, resulting in a permanent leak of a socket connection and potentially leading to a denial of service.
CVE-2020-1700 has a severity rating of 6.5, which is considered medium.
The following software versions are affected by CVE-2020-1700: ceph 12.2.12-0ubuntu0.18.04.5, ceph 14.2.4-0ubuntu0.19.10.2, ceph 14.2.7-1, Ceph Ceph, Redhat Openshift Container Storage 4.2, openSUSE Leap 15.1, Canonical Ubuntu Linux 18.04, and Canonical Ubuntu Linux 19.10.
An authenticated attacker can exploit CVE-2020-1700 by making multiple disconnect attempts, causing a permanent leak of a socket connection and potentially leading to a denial of service.
You can find more information about CVE-2020-1700 at the following references: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1700), [OpenSUSE security announcement](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00009.html), and [Ubuntu security notice](https://usn.ubuntu.com/4304-1/).