Unrated severityNVD Advisory· Published Nov 8, 2019· Updated Feb 13, 2025
CVE-2019-10222
CVE-2019-10222
Description
A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.
Affected products
20- osv-coords19 versionspkg:apk/chainguard/ceph-18pkg:apk/chainguard/ceph-19pkg:apk/chainguard/ceph-20pkg:apk/chainguard/ceph-20.2pkg:apk/chainguard/ceph-20-devpkg:apk/chainguard/ceph-20-docpkg:apk/chainguard/ceph-20-libspkg:apk/chainguard/ceph-devpkg:apk/wolfi/ceph-19pkg:apk/wolfi/ceph-20pkg:apk/wolfi/ceph-20.2pkg:apk/wolfi/ceph-20-devpkg:apk/wolfi/ceph-20-docpkg:apk/wolfi/ceph-20-libspkg:apk/wolfi/ceph-devpkg:rpm/suse/ceph&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/ceph&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/ceph-iscsi&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/ses-manual_en&distro=SUSE%20Enterprise%20Storage%206
< 0+ 18 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 14.2.2.349+g6716a1e448-3.9.1
- (no CPE)range: < 14.2.2.349+g6716a1e448-3.9.1
- (no CPE)range: < 3.3+1570532654.g93940a4-3.7.1
- (no CPE)range: < 6+git145.1558531-3.17.1
- The Ceph Project/cephv5Range: n/a
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- tracker.ceph.com/issues/40018mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2023/10/msg00034.htmlmitre
News mentions
0No linked articles in our index yet.