oss-sec mailing list archives
CVE-2024-47866 Ceph: RGW DoS via improper input validation.
From: "Sage [They / Them] McTaggart" <amctagga () redhat com>
Date: Tue, 11 Nov 2025 09:49:19 -0500
Hello all, A flaw was found in Ceph's RGW module. An attacker can use improper input validation to create a Denial Of Service within RGW. By using the argument `x-amz-copy-source` to put an object and specifying an empty string as its content , it will lead to the RGW daemon crashing, resulting in a DoS attack. Our public advisory may be found at the following URL: https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8 We have assigned it a CVE of CVE-2024-47866 with a CVSS Score of 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H It is fixed in an upstream PR[1] and will be backported promptly to other releases. In downstream Ceph, it will be patched in Ceph 8.1z4 [2] set to be released this week. [1]https://github.com/ceph/ceph/pull/65159 [2] https://www.ibm.com/docs/en/storage-ceph/8.1.0?topic=release-notes-81 Credits to: Ying Wang for discovery. Sage McTaggart IBM Product Security amct () redhat com sagemct () ibm com Pronouns:They/Them/Theirs
Current thread:
- CVE-2024-47866 Ceph: RGW DoS via improper input validation. Sage [They / Them] McTaggart (Nov 11)
