Bug 1902111 (CVE-2020-27813)

Summary: CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
Product: [Other] Security Response Reporter: Jason Shepherd <jshepherd>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: alazar, alegrand, amasferr, anpicker, aos-bugs, bbrownin, bdettelb, beth.white, bmontgom, chazlett, cnv-qe-bugs, eparis, erooth, fdeutsch, gghezzo, gparvin, jburrell, jhadvig, jokerman, jramanat, jweiser, jwon, kakkoyun, kconner, kmullins, krathod, lcosic, lgamliel, markito, mfilanov, mfojtik, mloibl, nstielau, oyahud, pkrupa, rcernich, rfreiman, rrajasek, sbatsche, sgott, sponnaga, stcannon, stirabos, sttts, surbania, thee, tomckay, xxia
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
See Also: https://issues.redhat.com//browse/MAISTRA-2018
https://issues.redhat.com//browse/MAISTRA-2019
https://issues.redhat.com//browse/SRVCOM-1129
https://issues.redhat.com//browse/THREESCALE-6430
https://issues.redhat.com//browse/THREESCALE-6431
Whiteboard:
Fixed In Version: github.com/gorilla/websocket v1.4.1 Doc Type: If docs needed, set a value
Doc Text:
An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-01-19 17:59:38 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1902115, 1902116, 1902117, 1902118, 1902119, 1902120, 1902121, 1902122, 1902123, 1902124, 1902288, 1902289, 1902640, 1902641, 1902642, 1902643, 1902644, 1902647, 1902648, 1902649, 1902650, 1902986, 1913825, 1930222, 1930229    
Bug Blocks: 1901506    

Description Jason Shepherd 2020-11-27 00:20:14 UTC
An integer overflow vulnerability exists with the length of frames received via a websocket connections. An attacker would use this flaw to cause a denial of service attack on a HTTP Server serving websocket connections.

Comment 11 Przemyslaw Roguski 2020-11-30 10:33:33 UTC
External References:

https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh

Comment 18 errata-xmlrpc 2021-01-19 13:22:33 UTC
This issue has been addressed in the following products:

  RHEL-8-CNV-2.5
  RHEL-7-CNV-2.5

Via RHSA-2021:0187 https://access.redhat.com/errata/RHSA-2021:0187

Comment 19 errata-xmlrpc 2021-01-19 13:53:51 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.6

Via RHSA-2021:0190 https://access.redhat.com/errata/RHSA-2021:0190

Comment 20 Product Security DevOps Team 2021-01-19 17:59:38 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-27813

Comment 23 errata-xmlrpc 2021-02-24 15:10:26 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2020:5633 https://access.redhat.com/errata/RHSA-2020:5633

Comment 24 errata-xmlrpc 2021-02-24 18:14:16 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2020:5364 https://access.redhat.com/errata/RHSA-2020:5364

Comment 25 errata-xmlrpc 2021-02-24 21:18:50 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2021:0100 https://access.redhat.com/errata/RHSA-2021:0100

Comment 26 errata-xmlrpc 2021-03-10 11:15:54 UTC
This issue has been addressed in the following products:

  RHEL-8-CNV-2.6

Via RHSA-2021:0799 https://access.redhat.com/errata/RHSA-2021:0799

Comment 27 errata-xmlrpc 2021-03-25 09:50:07 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2021:0833 https://access.redhat.com/errata/RHSA-2021:0833

Comment 28 errata-xmlrpc 2021-05-24 17:14:35 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.7

Via RHSA-2021:1561 https://access.redhat.com/errata/RHSA-2021:1561

Comment 29 errata-xmlrpc 2021-07-27 14:19:18 UTC
This issue has been addressed in the following products:

  RHEL-8-CNV-4.8

Via RHSA-2021:2920 https://access.redhat.com/errata/RHSA-2021:2920