Bug 1560399 (CVE-2018-1303)
Summary: | CVE-2018-1303 httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | apmukher, bmaxwell, bnater, b.prins, cdewolf, chazlett, csutherl, darran.lofthouse, dffrench, dimitris, dosoudil, drusso, fgavrilo, gzaronik, hhorak, jawilson, jclere, jdoyle, jkaluza, jmadigan, jondruse, jorton, jshepherd, kbost, lgao, lgriffin, luhliari, mbabacek, mturk, myarboro, ngough, pahan, pgier, pjurak, ppalaga, preichl, psakar, pslavice, pwright, rnetuka, rrajasek, rstancel, rsvoboda, sfowler, trepel, twalsh, vtunka, weli, yozone |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.30 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:18:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1560400, 1560404, 1565457, 1565458, 1565459 | ||
Bug Blocks: | 1560402 |
Description
Sam Fowler
2018-03-26 04:43:12 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1560400] Analysis: If the apache server is configured to use mod_cache, a client could send a specially crafted http header, causing the process to crash. Apache is by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed. Statement: The versions of httpd package shipped with Red Hat Enterprise Linux are by default configured in prefork MPM mode, which means that this flaw can result in a crash of child process. The main web server process will not be killed. Also, though the module is loaded by default, it needs to be specifically enabled in order to be exposed to the security flaw. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0366 This issue has been addressed in the following products: JBoss Core Services on RHEL 6 JBoss Core Services on RHEL 7 Via RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:0367 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:3958 https://access.redhat.com/errata/RHSA-2020:3958 |