Bug 1928172 (CVE-2020-13949)
Summary: | CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aboyko, aileenc, akoufoud, alazarot, alazar, almorale, anstephe, aos-bugs, asoldano, atangrin, avibelli, bbaranow, beth.white, bgeorges, bibryam, bmaxwell, bmontgom, brian.stansberry, cdewolf, chazlett, clement.escoffier, ctubbsii, dandread, darran.lofthouse, dbecker, dkreling, dosoudil, drieden, eclipseo, eleandro, eparis, etirelli, ganandan, ggaughan, gghezzo, gmalinko, go-sig, gparvin, gsmet, hamadhan, hbraun, ibek, iweiss, janstey, jburrell, jcosta, jhrozek, jjoyce, jnethert, jochrist, jokerman, jolee, josorior, jpallich, jperkins, jramanat, jschatte, jschluet, jstastny, jweiser, jwon, kaycoth, krathod, kverlaen, kwills, lgamliel, lgao, lhh, lnacshon, loleary, lpeer, lthon, mburns, mfilanov, milleruntime, mkolesni, mnovotny, mrogers, msochure, msvehla, mszynkie, nstielau, nwallace, orion, pantinor, pdhamdhe, pdrozd, pgallagh, pjindal, pmackay, probinso, rfreiman, rguimara, rhel8-maint, rrajasek, rruss, rstancel, rsvoboda, rsynek, sbiarozk, sclewis, scohen, sdaley, sd-operator-metering, sdouglas, slinaber, smaestri, spinder, sponnaga, stcannon, sthorger, swoodman, swshanka, team-winc, tflannag, thee, theute, tom.jenkinson, xiyuan |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libthrift 0.14.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in libthrift. Applications using Thrift would not show an error upon receiving messages declaring containers of sizes larger than the payload. This results in malicious RPC clients with the ability to send short messages which would result in a large memory allocation, potentially leading to denial of service. The highest threat from this vulnerability is to system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-03-30 11:51:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1928174, 1928175, 1928176, 1928808, 1928809, 1928810, 1928811, 1928812, 1928813, 1928814, 1928815, 1928895, 1928896, 1929386, 1930024, 1930025, 1930026, 1930027, 1930233, 1930234 | ||
Bug Blocks: | 1928173 |
Description
Guilherme de Almeida Suckevicz
2021-02-12 14:48:16 UTC
Created golang-github-apache-thrift tracking bugs for this issue: Affects: fedora-all [bug 1928176] Created thrift tracking bugs for this issue: Affects: epel-all [bug 1928175] Affects: fedora-all [bug 1928174] Marking Red Hat Jboss Fuse 6, Red Hat Fuse 7 and Red Hat Integration Camel-K as having a moderate impact, this is because although a vulnerable version of libthrift is available for use in camel (camel-thrift) it does not run as a default service and a successful attack cannot be accomplished at will. Marking Red Hat AMQ Streams as having a moderate impact, this is because in AMQ Streams the use of libthrift is through Jaeger, Jaeger tracing is not enabled by default and must be enabled for any possibility of a viable attack, another factor is the jaeger client does not expose ports to the WAN so instead the attack vector would be adjacent. This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6 * Red Hat JBoss Operations Network 3 * Red Hat JBoss Data Virtualization 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. Marking Red Hat JBoss Enterprise Application Platform as having a moderate impact, this is because in Red Hat JBoss Enterprise Application Platform the use of libthrift is through Jaeger client, the Jaeger client does not create a thrift listener which is a prerequisite of the attack. thrift 0.14.0 is a so-name bump from 0.13. Is there any indication what commit(s) fixed this issue? The ticket remained open, closing as wontfix Statement: * A vulnerable version of the libthrift library is delivered in listed OpenShift Container Platform (OCP) and OpenShift Jaeger (Jaeger) components, but the vulnerable code is not invoked, therefore these components are affected but with impact Moderate. * For Red Hat OpenStack, because the fix would require a substantial amount of development and OpenDaylight is deprecated in all future versions (RHOSP10 was in tech preview), no update will be provided at this time for the RHOSP libthrift package. This issue has been addressed in the following products: Red Hat OpenShift Jaeger 1.20 Via RHSA-2021:2543 https://access.redhat.com/errata/RHSA-2021:2543 This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134 |