CVE-2020-1700
Published: 31 January 2020
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Priority
CVSS 3 base score: 6.5
Status
Package | Release | Status |
---|---|---|
ceph Launchpad, Ubuntu, Debian |
bionic |
Released
(12.2.12-0ubuntu0.18.04.5)
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Released
(14.2.4-0ubuntu0.19.10.2)
|
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(14.2.7-1)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://github.com/ceph/ceph/commit/ff72c50a2c43c57aead933eb4903ad1ca6d1748a |