Bug 1049748 (CVE-2012-6619)
| Summary: | CVE-2012-6619 mongodb: memory over-read via incorrect BSON object length | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Ratul Gupta <ratulg> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | abaron, admiller, aortega, apevec, athomas, ayoung, bgollahe, bhu, bkearney, bleanhar, bretm, ccoleman, chrisw, cpelland, dmcphers, drieden, esammons, fpercoco, gkotton, iboverma, iheim, jdetiber, jialiu, jim, jmatthew, johan.o.hedin, jross, jrusnack, katello-bugs, kseifried, lhh, lmeyer, markmc, matt, mcressma, mmaslano, mmccune, mmcgrath, mrg-program-list, nathaniel, nobody+bgollahe, ovasik, rbryant, rhos-maint, sclewis, tdawson, tsanders, williams, yeylon |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | mongodb 2.3.2 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2015-01-17 05:44:22 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1050760, 1050761, 1050762, 1050763, 1050764, 1050767, 1050768, 1050769 | ||
| Bug Blocks: | 1049750, 1059047 | ||
|
Description
Ratul Gupta
2014-01-08 06:36:03 UTC
According to http://www.mongodb.org/about/alerts/#security-related this issue was corrected on 11/27/2012 and affects version 2.3.1 and earlier, and is corrected in 2.3.2. It is described as "Object validation (--objcheck) not performed by default." The upstream original bug report for this is: https://jira.mongodb.org/browse/SERVER-7769 Which indicates the following commits correct the issue: https://github.com/mongodb/mongo/commit/6889d1658136c753998b4a408dc8d1a3ec28e3b9 https://github.com/mongodb/mongo/commit/f9817a6cf64bdba8e1e1cef30a798110df746b58 As an aside, there is an implication in the upstream bugs that were duped against SERVER-7769 that this also can cause a denial of service (crash of the mongodb server process). The upstream report does not indicate when the flaw was introduced, so it is unknown as of yet whether or not 1.x is affected by this at all. This issue can be dealt with by using the --objcheck command line switch in older versions of MongoDB, this switch was enabled as the default behavior in version 2.3.2 and later. This issue has been addressed in following products: OpenStack 4 for RHEL 6 Via RHSA-2014:0230 https://rhn.redhat.com/errata/RHSA-2014-0230.html This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0440 https://rhn.redhat.com/errata/RHSA-2014-0440.html Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui. |