Bug 1816216 (CVE-2020-11612)
Summary: | CVE-2020-11612 netty: compression/decompression codecs don't enforce limits on buffer allocation sizes | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, aos-bugs, asoldano, atangrin, ataylor, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bkearney, bmaxwell, bmontgom, brian.stansberry, btotty, cdewolf, chazlett, darran.lofthouse, dkreling, dosoudil, drieden, eparis, etirelli, extras-orphan, ganandan, ggaughan, gmalinko, hhudgeon, ibek, iweiss, janstey, java-sig-commits, jawilson, jbalunas, jburrell, jcantril, jerboaa, jochrist, jokerman, jpallich, jperkins, jross, jstastny, jwon, krathod, kverlaen, kwills, lakagwu, lgao, loleary, lthon, lzap, mmccune, mnovotny, msochure, msvehla, mszynkie, nstielau, nwallace, paradhya, pdrozd, pgallagh, pjindal, pmackay, psotirop, rchan, rgodfrey, rguimara, rjerrido, rrajasek, rruss, rsvoboda, rsynek, sdaley, smaestri, sochotni, sokeeffe, spinder, sponnaga, sthorger, swoodman, theute, tom.jenkinson |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | netty-4.1.46.Final | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-22 16:32:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1816447, 1816448, 1818879, 1865894 | ||
Bug Blocks: | 1816217 |
Description
Guilherme de Almeida Suckevicz
2020-03-23 15:18:33 UTC
The AMQ Broker has been marked as having a low impact, this is because although netty is built and distributed with the AMQ broker its actual use in the product doesn't use the decompression functionality provided by netty (jzlib) AMQ Online has been marked as having a low impact, this is because although netty distributed with AMQ Online its actual use in the product doesn't use the decompression functionality provided by netty (jzlib) This issue has been addressed in the following products: Red Hat AMQ Online 1.4.1 GA Via RHSA-2020:1538 https://access.redhat.com/errata/RHSA-2020:1538 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-11612 This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2020:1422 https://access.redhat.com/errata/RHSA-2020:1422 AMQ Clients has been marked as having a low impact, this is because although netty is built and distributed its actual use in the product doesn't use the decompression functionality provided by netty (jzlib). This issue has been addressed in the following products: AMQ Clients 2.y for RHEL 6 AMQ Clients 2.y for RHEL 7 AMQ Clients 2.y for RHEL 8 Via RHSA-2020:2605 https://access.redhat.com/errata/RHSA-2020:2605 This issue has been addressed in the following products: Red Hat AMQ Streams 1.5.0 Via RHSA-2020:2618 https://access.redhat.com/errata/RHSA-2020:2618 This issue has been addressed in the following products: Red Hat AMQ Via RHSA-2020:2751 https://access.redhat.com/errata/RHSA-2020:2751 This issue has been addressed in the following products: Red Hat AMQ Via RHSA-2020:3133 https://access.redhat.com/errata/RHSA-2020:3133 This issue has been addressed in the following products: Red Hat Decision Manager Via RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196 This issue has been addressed in the following products: Red Hat Process Automation Via RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197 Statement: In OpenShift Container Platform end users don't have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it. Third party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn't necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. Red Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release. More information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591 Created netty tracking bugs for this issue: Affects: fedora-all [bug 1865894] This issue has been addressed in the following products: Red Hat Single Sign-On 7.4.2 Via RHSA-2020:3501 https://access.redhat.com/errata/RHSA-2020:3501 This issue has been addressed in the following products: EAP-CD 20 Tech Preview Via RHSA-2020:3585 https://access.redhat.com/errata/RHSA-2020:3585 This issue has been addressed in the following products: Red Hat Data Grid Via RHSA-2020:3626 https://access.redhat.com/errata/RHSA-2020:3626 This issue has been addressed in the following products: Red Hat Data Grid 7.3.7 Via RHSA-2020:3779 https://access.redhat.com/errata/RHSA-2020:3779 This issue has been addressed in the following products: Red Hat build of Quarkus 1.7.5 Via RHSA-2020:4252 https://access.redhat.com/errata/RHSA-2020:4252 This issue has been addressed in the following products: Red Hat Fuse 7.8.0 Via RHSA-2020:5568 https://access.redhat.com/errata/RHSA-2020:5568 This issue has been addressed in the following products: Red Hat Satellite 6.8 for RHEL 7 Via RHSA-2021:1313 https://access.redhat.com/errata/RHSA-2021:1313 Marking Red Hat Fuse 7 as having a low impact, Fuse 7 distributes affected versions of Netty in the Karaf Narayana transaction manager, however the vulnerable functionality of these artifacts is not used. |