CVE-2019-10222
Summary
| CVE | CVE-2019-10222 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-11-08 15:15:00 UTC |
| Updated | 2023-10-23 19:15:00 UTC |
| Description | A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| 1739292 – (CVE-2019-10222) CVE-2019-10222 ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend |
MISC |
bugzilla.redhat.com |
|
| [SECURITY] [DLA 3629-1] ceph security update |
MISC |
lists.debian.org |
|
| 1739292 – (CVE-2019-10222) CVE-2019-10222 ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Mitigation, Patch, Vendor Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| Bug #40018: crash in io_context thread when lots of connections abort - rgw - Ceph |
MISC |
tracker.ceph.com |
Vendor Advisory |
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500845 Alpine Linux Security Update for ceph
- 502822 Alpine Linux Security Update for ceph16
- 6000278 Debian Security Update for ceph (DLA 3629-1)