All errata/sisyphus/ALT-PU-2020-1266-1
ALT-PU-2020-1266-1

Package update ceph in branch sisyphus

Version14.2.7-alt1
Published2020-02-19
Max severityHIGH
Severity:

Closed issues (3)

BDU:2021-01325
MEDIUM6.3

Уязвимость метода rgw::asio::ClientIO из rgw/rgw_asio_frontend.cc системы хранения данных Ceph, позволяющая нарушителю вызвать отказ в обслуживании

Published: 2021-03-15Modified: 2024-09-16
CVSS 3.xMEDIUM 6.3
CVSS:3.x/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS 2.0MEDIUM 6.8
CVSS:2.0/AV:N/AC:L/Au:S/C:N/I:N/A:C
References
CVE-2020-1699
HIGH7.5

A path traversal flaw was found in the Ceph dashboard implemented in upstream versions v14.2.5, v14.2.6, v15.0.0 of Ceph storage and has been fixed in versions 14.2.7 and 15.1.0. An unauthenticated attacker could use this flaw to cause information disclosure on the host machine running the Ceph dashboard.

Published: 2020-04-21Modified: 2024-11-21
CVSS 2.0MEDIUM 5.0
CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 3.xHIGH 7.5
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2020-1700
MEDIUM6.5

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.

Published: 2020-02-07Modified: 2024-11-21
CVSS 2.0MEDIUM 6.8
CVSS:2.0/AV:N/AC:L/Au:S/C:N/I:N/A:C
CVSS 3.xMEDIUM 6.5
CVSS:3.x/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H