Bug 1605048 (CVE-2018-1333)
Summary: | CVE-2018-1333 httpd: mod_http2: Too much time allocated to workers, possibly leading to DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abhgupta, anon.amish, bmaxwell, bmcclain, bnater, bpowers, cdewolf, chazlett, cmacedo, csutherl, darran.lofthouse, dbaker, dblechte, dfediuck, dffrench, dimitris, dosoudil, drusso, eedri, fgavrilo, gzaronik, hhorak, jawilson, jclere, jdoyle, jkaluza, jmadigan, jokerman, jondruse, jorton, jshepherd, lgao, lgriffin, luhliari, mbabacek, mgoldboi, michal.skrivanek, mturk, myarboro, ngough, pahan, pgier, pjurak, ppalaga, psakar, pslavice, pwright, rnetuka, rstancel, rsvoboda, sbonazzo, sherold, sstavrev, sthangav, trankin, trepel, twalsh, vtunka, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.34 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:33:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1605049, 1605050, 1609083, 1616051 | ||
Bug Blocks: | 1605053 |
Description
Sam Fowler
2018-07-20 04:49:23 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1605049] HTTP/2 support was first added upstream in version 2.4.17: https://httpd.apache.org/docs/2.4/mod/mod_http2.html http://archive.apache.org/dist/httpd/CHANGES_2.4.17 Hence earlier versions can not be affected. Additionally, upstream lists version 2.4.18 as the first affected. Upstream commit: http://svn.apache.org/viewvc?view=revision&revision=1828879 Matching commit in the mod_h2 git: https://github.com/icing/mod_h2/commit/83a2e3866918ce6567a683eb4c660688d047ee81 httpd24-httpd (2.4.27) appears to be vulnerable. http2 modules are built and loaded by default. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558 This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2019:0366 https://access.redhat.com/errata/RHSA-2019:0366 This issue has been addressed in the following products: JBoss Core Services on RHEL 6 JBoss Core Services on RHEL 7 Via RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:0367 |