Bug 1656852 (CVE-2019-3821) - CVE-2019-3821 ceph: radosgw: Resource exhaustion via TCP connection to port serving the SSL endpoint
Summary: CVE-2019-3821 ceph: radosgw: Resource exhaustion via TCP connection to port s...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-3821
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20190211,repo...
Depends On: 1674929
Blocks: 1656854
TreeView+ depends on / blocked
 
Reported: 2018-12-06 13:24 UTC by Pedro Sampaio
Modified: 2019-06-08 23:45 UTC (History)
12 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service.
Clone Of:
Environment:
Last Closed: 2019-04-24 15:25:24 UTC


Attachments (Terms of Use)

Description Pedro Sampaio 2018-12-06 13:24:10 UTC
A flaw was found in rados gateway shipped as part of ceph. Unclosed file descriptors while denying TCP connections to SSL serving port pile up until exhaustion of resources leading to potencial remote denial of service.

Comment 2 Siddharth Sharma 2019-02-11 17:19:03 UTC
External References:

https://github.com/ceph/civetweb/pull/33

Comment 3 Siddharth Sharma 2019-02-11 17:19:17 UTC
Created ceph tracking bugs for this issue:

Affects: fedora-all [bug 1674929]

Comment 4 Siddharth Sharma 2019-02-11 17:20:52 UTC
Statement:

This flaw does not  affect ceph version as shipped with Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3.


Note You need to log in before you can comment on or make changes to this bug.