A flaw was found in the Ceph RGW configuration with Beast as the front end
handling client requests. An unauthenticated attacker could crash the Ceph
RGW server by sending valid HTTP headers and terminating the connection,
resulting in a remote denial of service for Ceph RGW clients.
Author | Note |
---|---|
sbeattie | only in beast rados gw frontend nautilus (14.x), mimic (13.x), and luminous (12.x), the latter as experimental feature. |
github.com/ceph/ceph/commit/6171399fdedd928b4249d135b4036e3de25079aa
github.com/ceph/ceph/pull/29967
launchpad.net/bugs/cve/CVE-2019-10222
nvd.nist.gov/vuln/detail/CVE-2019-10222
security-tracker.debian.org/tracker/CVE-2019-10222
ubuntu.com/security/notices/USN-4112-1
www.cve.org/CVERecord?id=CVE-2019-10222