CVE-2020-1700

Priority
Description
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected
disconnects. An authenticated attacker can abuse this flaw by making
multiple disconnect attempts resulting in a permanent leak of a socket
connection by radosgw. This flaw could lead to a denial of service
condition by pile up of CLOSE_WAIT sockets, eventually leading to the
exhaustion of available resources, preventing legitimate users from
connecting to the system.
Assigned-to
mdeslaur
Notes
Package
Source: ceph (LP Ubuntu Debian)
Upstream:released (14.2.7-1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):needed
Ubuntu 20.04 (Focal Fossa):needed
Patches:
Upstream:https://github.com/ceph/ceph/commit/ff72c50a2c43c57aead933eb4903ad1ca6d1748a
More Information

Updated: 2020-02-12 19:14:37 UTC (commit 5ebda2a6a93e97e0ec4f0528704ad03cccbb75f7)