Bug 1944888 (CVE-2021-21409)
Summary: | CVE-2021-21409 netty: Request smuggling via content-length header | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, aileenc, akoufoud, alazarot, almorale, andjrobins, anstephe, aos-bugs, asoldano, atangrin, ataylor, avibelli, bbaranow, bbuckingham, bcourt, bgeorges, bkearney, bmaxwell, bmontgom, brian.stansberry, btotty, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, dbecker, dbhole, dkreling, dosoudil, drieden, ebaron, eclipse-sig, eleandro, eparis, etirelli, ewolinet, extras-orphan, fjuma, ggaughan, gmalinko, gsmet, hamadhan, hhudgeon, ibek, iweiss, janstey, java-sig-commits, jburrell, jcantril, jerboaa, jjohnstn, jjoyce, jochrist, jokerman, jpallich, jperkins, jross, jschluet, jstastny, jwon, kaycoth, krathod, kverlaen, kwills, lef, lgao, lhh, loleary, lpeer, lthon, lzap, mburns, mkolesni, mmccune, mnovotny, msochure, msvehla, mszynkie, nmoumoul, nstielau, nwallace, pcreech, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, rchan, rgodfrey, rgrunber, rguimara, rjerrido, rrajasek, rruss, rstancel, rsvoboda, rsynek, sbiarozk, sclewis, scohen, sdaley, sd-operator-metering, sdouglas, slinaber, smaestri, sochotni, sokeeffe, spinder, sponnaga, sthorger, swoodman, tflannag, theute, tom.jenkinson, yborgess |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | netty-codec-http 4.1.61.Final | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Netty. There is an issue where the content-length header is not validated correctly if the request uses a single Http2HeaderFrame with the endstream set to true. This flaw leads to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. The highest threat from this vulnerability is to integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-05-06 08:33:58 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1927083, 1938252, 1944889, 1944890, 1945202 | ||
Bug Blocks: | 1944891 |
Description
Pedro Sampaio
2021-03-30 20:58:50 UTC
Created eclipse tracking bugs for this issue: Affects: fedora-all [bug 1944890] Created netty tracking bugs for this issue: Affects: fedora-all [bug 1944889] Statement: Red Hat Satellite ships a vulnerable Netty version embedded in Candlepin. However, it is not directly vulnerable since the HTTP requests are handled by Tomcat and not by Netty. Red Hat OpenStack Platform's OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws. In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec-http package. Since the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix. This may be fixed in the future. External References: https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32 This issue has been addressed in the following products: AMQ Clients 2.y for RHEL 7 AMQ Clients 2.y for RHEL 8 Via RHSA-2021:1511 https://access.redhat.com/errata/RHSA-2021:1511 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-21409 This issue has been addressed in the following products: Red Hat Data Grid 8.2.0 Via RHSA-2021:2139 https://access.redhat.com/errata/RHSA-2021:2139 This issue has been addressed in the following products: Vert.x 4.1.0 Via RHSA-2021:2465 https://access.redhat.com/errata/RHSA-2021:2465 This issue has been addressed in the following products: Red Hat AMQ 7.8.2 Via RHSA-2021:2689 https://access.redhat.com/errata/RHSA-2021:2689 This issue has been addressed in the following products: EAP 7.3.8 Via RHSA-2021:2696 https://access.redhat.com/errata/RHSA-2021:2696 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7 Via RHSA-2021:2693 https://access.redhat.com/errata/RHSA-2021:2693 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6 Via RHSA-2021:2692 https://access.redhat.com/errata/RHSA-2021:2692 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8 Via RHSA-2021:2694 https://access.redhat.com/errata/RHSA-2021:2694 This issue has been addressed in the following products: Red Hat EAP-XP 2.0.0 via EAP 7.3.x base Via RHSA-2021:2755 https://access.redhat.com/errata/RHSA-2021:2755 This issue has been addressed in the following products: Red Hat Single Sign-On 7.4.8 Via RHSA-2021:2965 https://access.redhat.com/errata/RHSA-2021:2965 This issue has been addressed in the following products: Red Hat AMQ Streams 1.8.0 Via RHSA-2021:3225 https://access.redhat.com/errata/RHSA-2021:3225 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Via RHSA-2021:3656 https://access.redhat.com/errata/RHSA-2021:3656 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Via RHSA-2021:3658 https://access.redhat.com/errata/RHSA-2021:3658 This issue has been addressed in the following products: EAP 7.4.1 release Via RHSA-2021:3660 https://access.redhat.com/errata/RHSA-2021:3660 This issue has been addressed in the following products: Red Hat AMQ 7.9.0 Via RHSA-2021:3700 https://access.redhat.com/errata/RHSA-2021:3700 This issue has been addressed in the following products: Red Hat build of Quarkus 2.2.3 Via RHSA-2021:3880 https://access.redhat.com/errata/RHSA-2021:3880 This issue has been addressed in the following products: OpenShift Logging 5.3 Via RHSA-2021:5129 https://access.redhat.com/errata/RHSA-2021:5129 This issue has been addressed in the following products: OpenShift Logging 5.1 Via RHSA-2021:5128 https://access.redhat.com/errata/RHSA-2021:5128 This issue has been addressed in the following products: OpenShift Logging 5.2 Via RHSA-2021:5127 https://access.redhat.com/errata/RHSA-2021:5127 This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134 This issue has been addressed in the following products: Red Hat Satellite 6.11 for RHEL 7 Red Hat Satellite 6.11 for RHEL 8 Via RHSA-2022:5498 https://access.redhat.com/errata/RHSA-2022:5498 |