Description
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3629-1 | ceph security update |
EUVD |
EUVD-2020-12556 | A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system. |
Ubuntu USN |
USN-4304-1 | Ceph vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T06:46:30.305Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2020-1700
No data.
Status : Modified
Published: 2020-02-07T21:15:10.433
Modified: 2024-11-21T05:11:11.900
Link: CVE-2020-1700
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN