Bug 1120601 (CVE-2014-0118)
Summary: | CVE-2014-0118 httpd: mod_deflate denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | anmiller, bdunne, bressers, cdewolf, chazlett, dajohnso, dandread, darran.lofthouse, dclarizi, dknox, fnasser, gmccullo, grocha, huwang, jason.greene, jawilson, jclere, jdoyle, jfrey, jkaluza, jorton, jprause, jrafanie, jrusnack, jvlcek, kseifried, lgao, mmaslano, myarboro, obarenbo, pahan, pgier, pslavice, rmeggins, rsvoboda, vtunka, webstack-team, weli, xlecauch |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.10 | Doc Type: | Bug Fix |
Doc Text: |
A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-10 02:46:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1120605, 1120606, 1120607, 1120608, 1120612, 1120613, 1120614, 1120935, 1120936, 1120937, 1120938, 1120939, 1120940, 1121037, 1121038 | ||
Bug Blocks: | 1064757, 1116304, 1120610, 1120623 |
Description
Murray McAllister
2014-07-17 09:12:54 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1120614] Upstream commit: http://svn.apache.org/viewvc?view=revision&revision=1610501 This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0920 https://rhn.redhat.com/errata/RHSA-2014-0920.html This issue has been addressed in following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Via RHSA-2014:0922 https://rhn.redhat.com/errata/RHSA-2014-0922.html This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0921 https://rhn.redhat.com/errata/RHSA-2014-0921.html httpd-2.4.10-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. IssueDescription: A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. This issue has been addressed in following products: JBoss Enterprise Application Platform 6.3.0 Via RHSA-2014:1021 https://rhn.redhat.com/errata/RHSA-2014-1021.html This issue has been addressed in following products: JBEAP 6 for RHEL 6 Via RHSA-2014:1020 https://rhn.redhat.com/errata/RHSA-2014-1020.html This issue has been addressed in following products: JBEAP 6 for RHEL 5 Via RHSA-2014:1019 https://rhn.redhat.com/errata/RHSA-2014-1019.html httpd-2.4.10-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: JBEWS 2 for RHEL 5 Via RHSA-2014:1088 https://rhn.redhat.com/errata/RHSA-2014-1088.html This issue has been addressed in following products: JBEWS 2 for RHEL 6 Via RHSA-2014:1087 https://rhn.redhat.com/errata/RHSA-2014-1087.html This issue has been addressed in following products: JBoss Web Server 2.1.0 Via RHSA-2014:1086 https://rhn.redhat.com/errata/RHSA-2014-1086.html |