CVE-2019-10222

Source
https://cve.org/CVERecord?id=CVE-2019-10222
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10222.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-10222
Downstream
Related
Published
2019-11-08T15:15:11.437Z
Modified
2026-02-21T01:18:38.608305Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the Ceph RGW configuration with Beast as the front end handling client requests. An unauthenticated attacker could crash the Ceph RGW server by sending valid HTTP headers and terminating the connection, resulting in a remote denial of service for Ceph RGW clients.

References

Affected packages

Git / github.com/libarchive/libarchive

Affected ranges

Type
GIT
Repo
https://github.com/libarchive/libarchive
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v2.*
v2.6.0
v2.6.1
v2.6.2
v2.7.0
v2.7.1
v3.*
v3.0.0a

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10222.json"