Bug 1851431 (CVE-2011-5034)

Summary: CVE-2011-5034 apache-geronimo: hash table collisions CPU usage DoS
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aboyko, aileenc, asoldano, atangrin, ataylor, bbaranow, bmaxwell, brian.stansberry, cdewolf, chazlett, csutherl, darran.lofthouse, dbecker, dkreling, dosoudil, drieden, ganandan, ggaughan, gmalinko, gvarsami, gzaronik, iweiss, janstey, jawilson, jclere, jcoleman, jjoyce, jochrist, jperkins, jschluet, jwon, kbasil, kconner, krathod, kwills, ldimaggi, lgao, lhh, lpeer, mbabacek, mburns, mkolesni, msochure, msvehla, myarboro, nwallace, pjindal, pmackay, psotirop, rguimara, rstancel, rsvoboda, rwagner, sclewis, scohen, slinaber, smaestri, tcunning, tkirby, tom.jenkinson, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: geronimo 2.2.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-07-02 07:27:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1851825    
Bug Blocks: 1850754    

Description Guilherme de Almeida Suckevicz 2020-06-26 13:48:34 UTC
Geronimo 2.2.1 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Reference:
http://ocert.org/advisories/ocert-2011-003.html

Comment 1 Summer Long 2020-06-29 06:10:12 UTC
External References:

https://geronimo.apache.org/22x-security-report.html

Comment 4 Summer Long 2020-06-29 06:28:12 UTC
Upstream issue: https://issues.apache.org/jira/browse/GERONIMO-6253

Comment 6 Jonathan Christison 2020-06-29 08:13:39 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat Jboss Fuse 6
 * Red Hat JBoss A-MQ 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 8 Summer Long 2020-06-30 01:38:58 UTC
Statement:

apache-geronimo is packaged with Red Hat OpenStack Platform 13.0's OpenDaylight (ODL). However because the flaw is moderate, Red Hat will not be releasing a fix for the ODL package at this time.

Comment 11 Product Security DevOps Team 2020-07-02 07:27:36 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2011-5034