Your submission was sent successfully! Close

CVE-2020-1700

Published: 31 January 2020

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

Priority

Medium

CVSS 3 base score: 6.5

Status

Package Release Status
ceph
Launchpad, Ubuntu, Debian
bionic
Released (12.2.12-0ubuntu0.18.04.5)
disco Ignored
(reached end-of-life)
eoan
Released (14.2.4-0ubuntu0.19.10.2)
precise Not vulnerable
(code not present)
trusty Not vulnerable
(code not present)
upstream
Released (14.2.7-1)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/ceph/ceph/commit/ff72c50a2c43c57aead933eb4903ad1ca6d1748a