Bug 1991299 (CVE-2021-3690)

Summary: CVE-2021-3690 undertow: buffer leak on incoming websocket PONG message may lead to DoS
Product: [Other] Security Response Reporter: Kunjan Rathod <krathod>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aboyko, aileenc, akoufoud, alazarot, almorale, anstephe, asoldano, atangrin, avibelli, bbaranow, bgeorges, bibryam, bmaxwell, brian.stansberry, cdewolf, chazlett, clement.escoffier, cmoulliard, dandread, darran.lofthouse, dbecker, dkreling, dosoudil, drieden, eleandro, eric.wittmann, etirelli, fjuma, ggaughan, gmalinko, gsmet, hamadhan, hbraun, ibek, ikanello, iweiss, janstey, jjoyce, jnethert, jochrist, jpallich, jperkins, jrokos, jschluet, jstastny, jwon, krathod, kverlaen, kwills, lakagwu, lgao, lhh, lpeer, lthon, mburns, mnovotny, msochure, msvehla, mszynkie, nwallace, pantinor, pdrozd, peholase, pgallagh, pjindal, pmackay, probinso, rguimara, rrajasek, rruss, rstancel, rsvoboda, sbiarozk, sclewis, sdouglas, slinaber, smaestri, sthorger, tom.jenkinson, tzimanyi, yborgess
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-08-18 21:35:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1990700, 1991309    

Description Kunjan Rathod 2021-08-09 00:08:26 UTC
A vulnerability was found in Undertow where buffer leak on incoming websocket PONG message may lead to memory exhaustion. 

https://issues.redhat.com/browse/UNDERTOW-1935

Comment 22 errata-xmlrpc 2021-08-18 18:05:42 UTC
This issue has been addressed in the following products:

  EAP 7.3 async

Via RHSA-2021:3216 https://access.redhat.com/errata/RHSA-2021:3216

Comment 23 errata-xmlrpc 2021-08-18 18:08:15 UTC
This issue has been addressed in the following products:

  EAP 7.4 async

Via RHSA-2021:3218 https://access.redhat.com/errata/RHSA-2021:3218

Comment 24 errata-xmlrpc 2021-08-18 18:11:42 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6
  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8

Via RHSA-2021:3217 https://access.redhat.com/errata/RHSA-2021:3217

Comment 25 errata-xmlrpc 2021-08-18 18:18:57 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2021:3219 https://access.redhat.com/errata/RHSA-2021:3219

Comment 26 Product Security DevOps Team 2021-08-18 21:35:00 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3690

Comment 29 errata-xmlrpc 2021-09-08 13:06:13 UTC
This issue has been addressed in the following products:

  EAP 7.3.9 release

Via RHSA-2021:3471 https://access.redhat.com/errata/RHSA-2021:3471

Comment 30 errata-xmlrpc 2021-09-08 14:05:02 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8

Via RHSA-2021:3468 https://access.redhat.com/errata/RHSA-2021:3468

Comment 31 errata-xmlrpc 2021-09-08 14:07:06 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6

Via RHSA-2021:3466 https://access.redhat.com/errata/RHSA-2021:3466

Comment 32 errata-xmlrpc 2021-09-08 14:09:27 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7

Via RHSA-2021:3467 https://access.redhat.com/errata/RHSA-2021:3467

Comment 33 errata-xmlrpc 2021-09-09 06:19:20 UTC
This issue has been addressed in the following products:

  Red Hat support for Spring Boot 2.3.10

Via RHSA-2021:3425 https://access.redhat.com/errata/RHSA-2021:3425

Comment 34 errata-xmlrpc 2021-09-13 17:34:32 UTC
This issue has been addressed in the following products:

  Red Hat EAP-XP 2.0.0 via EAP 7.3.x base

Via RHSA-2021:3516 https://access.redhat.com/errata/RHSA-2021:3516

Comment 35 errata-xmlrpc 2021-09-14 12:38:11 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.4.9

Via RHSA-2021:3534 https://access.redhat.com/errata/RHSA-2021:3534

Comment 36 errata-xmlrpc 2021-09-23 16:16:11 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2021:3656 https://access.redhat.com/errata/RHSA-2021:3656

Comment 37 errata-xmlrpc 2021-09-23 16:24:59 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2021:3658 https://access.redhat.com/errata/RHSA-2021:3658

Comment 38 errata-xmlrpc 2021-09-23 16:30:37 UTC
This issue has been addressed in the following products:

  EAP 7.4.1 release

Via RHSA-2021:3660 https://access.redhat.com/errata/RHSA-2021:3660

Comment 39 errata-xmlrpc 2021-11-23 10:35:51 UTC
This issue has been addressed in the following products:

  Red Hat Integration

Via RHSA-2021:4767 https://access.redhat.com/errata/RHSA-2021:4767

Comment 40 errata-xmlrpc 2021-12-14 21:35:51 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.10

Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134

Comment 41 errata-xmlrpc 2022-03-23 08:23:00 UTC
This issue has been addressed in the following products:

  RHINT Camel-K 1.6.4

Via RHSA-2022:1029 https://access.redhat.com/errata/RHSA-2022:1029