Bug 1974891 (CVE-2021-34428)
Summary: | CVE-2021-34428 jetty: SessionListener can prevent a session from being invalidated breaking logout | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abenaiss, aileenc, akurtako, aos-bugs, ataylor, bibryam, bmontgom, chazlett, drieden, eclipse-sig, eparis, eric.wittmann, ggaughan, gmalinko, hbraun, janstey, java-sig-commits, jburrell, jjohnstn, jjoyce, jkang, jnethert, jochrist, jokerman, jross, jschluet, jwon, krzysztof.daniel, lhh, lpeer, mburns, mcoufal, mizdebsk, mkolesni, nstielau, pantinor, pbhattac, pjindal, sclewis, scohen, sd-operator-metering, slinaber, sochotni, sponnaga, swoodman, tflannag |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | jetty 9.4.41, jetty 10.0.3, jetty 11.0.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was discovered in the jetty-server, where if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts, this could result in a session not being invalidated and a shared-computer application being left logged in. The highest threat from this vulnerability is to data confidentiality and integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-08-19 09:35:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1979036, 1972084, 1972088, 1972361, 1974892, 1981629, 1981630 | ||
Bug Blocks: | 1974893 |
Description
Guilherme de Almeida Suckevicz
2021-06-22 17:52:21 UTC
Created jetty tracking bugs for this issue: Affects: fedora-all [bug 1974892] This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6 * Red Hat JBoss A-MQ 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. Upstream Fixing commit: https://github.com/eclipse/jetty.project/commit/087f486b4461746b4ded45833887b3ccb136ee85 Explicitly Marking Red Hat Camel K and Camel Quarkus as having a low impact, although Camel K distributes jetty artifacts through camel-jetty, camel-jetty itself is not available for use by the application developer, http functionality is provided by the camel-k default runtime, Quarkus. Explicitly Marking Red Hat Integration Red Hat Integration Service Registry as having a low impact, although Service Registry distributes Jetty as part of Kafka Connect component it is not available in the productised release, meaning jetty is also not available for use by the end application developer. This issue has been addressed in the following products: Red Hat AMQ Streams 1.8.0 Via RHSA-2021:3225 https://access.redhat.com/errata/RHSA-2021:3225 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-34428 This issue has been addressed in the following products: Red Hat AMQ 7.9.0 Via RHSA-2021:3700 https://access.redhat.com/errata/RHSA-2021:3700 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2021:3758 https://access.redhat.com/errata/RHSA-2021:3758 This issue has been addressed in the following products: Red Hat Integration Via RHSA-2021:4767 https://access.redhat.com/errata/RHSA-2021:4767 This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134 |