Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CABBoSti2LtHdkMw=dkx_0bAgfg6pnwnzLjGW_ung6cORPNzh5g@mail.gmail.com>
Date: Tue, 11 Nov 2025 09:49:19 -0500
From: "Sage [They / Them] McTaggart" <amctagga@...hat.com>
To: 王盈 <wangying2023@....ac.cn>, 
	oss-security@...ts.openwall.com
Subject: CVE-2024-47866 Ceph: RGW DoS via improper input validation.

Hello all,
A flaw was found in Ceph's RGW module. An attacker can use improper input
validation to create a Denial Of Service within RGW. By using the argument
`x-amz-copy-source` to put an object and specifying an empty string as its
content , it will lead to the RGW daemon crashing, resulting in a DoS
attack.

Our public advisory may be found at the following URL:
https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8

We have assigned it a CVE of CVE-2024-47866 with a CVSS Score of 7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
It is fixed in an upstream PR[1] and will be backported promptly to other
releases.
In downstream Ceph, it will be patched in Ceph 8.1z4 [2] set to be released
this week.

[1]https://github.com/ceph/ceph/pull/65159
[2] https://www.ibm.com/docs/en/storage-ceph/8.1.0?topic=release-notes-81

Credits to: Ying Wang for discovery.

Sage McTaggart
IBM Product Security

amct@...hat.com

sagemct@....com


Pronouns:They/Them/Theirs

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.