Bug 1401985 (CVE-2017-1000098)

Summary: CVE-2017-1000098 golang: net/http: multipart ReadForm close file after copy
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: admiller, ahardin, amurdaca, aortega, apevec, bleanhar, ccoleman, chrisw, cvsbot-xmlrpc, dedgar, deparker, dmcphers, golang-updates, jcajka, jgoulding, jialiu, joelsmith, jokerman, jschluet, kseifried, lemenkov, lhh, lmeyer, lpeer, markmc, mchappel, mmccomas, rbryant, renich, rhs-bugs, sclewis, sgirijan, sisharma, slong, srevivo, s, tdawson, tdecacqu
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: golang 1.6.4, golang 1.7.4 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-21 11:48:28 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1401987, 1401988, 1405647, 1405648    
Bug Blocks: 1401989    

Description Adam Mariš 2016-12-06 14:10:09 UTC
The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

Upstream bug:


Upstream patch:


External Reference:


Comment 1 Adam Mariš 2016-12-06 14:11:07 UTC
Created golang tracking bugs for this issue:

Affects: fedora-all [bug 1401987]
Affects: epel-all [bug 1401988]