Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1092783 - (CVE-2014-0193) CVE-2014-0193 netty: DoS via memory exhaustion during data aggregation
CVE-2014-0193 netty: DoS via memory exhaustion during data aggregation
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20140501,reported=2...
: Security
Depends On: 1160698 1092791 1092792 1092793 1092794 1092795 1092796 1092797 1092798 1092799 1092800 1092801 1092802 1092803 1169387 1200163
Blocks: 1059445 1082938 1092804 1093885 1114455 1116304 1181883 1182400 1182419 1200191
  Show dependency treegraph
 
Reported: 2014-04-29 22:19 EDT by Arun Babu Neelicattu
Modified: 2015-07-09 22:46 EDT (History)
56 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A flaw was found in the WebSocket08FrameDecoder implementation that could allow a remote attacker to trigger an Out Of Memory Exception by issuing a series of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on the server configuration, this could lead to a denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-07-09 22:46:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0818 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.2 update 2014-06-30 20:51:53 EDT
Red Hat Product Errata RHSA-2014:0910 normal SHIPPED_LIVE Important: Red Hat JBoss Operations Network 3.2.2 update 2014-07-21 18:35:10 EDT
Red Hat Product Errata RHSA-2014:1019 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update 2014-08-06 15:06:42 EDT
Red Hat Product Errata RHSA-2014:1020 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update 2014-08-06 15:03:06 EDT
Red Hat Product Errata RHSA-2014:1021 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 6.3.0 update 2014-08-06 14:52:25 EDT
Red Hat Product Errata RHSA-2014:1351 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse/A-MQ 6.1.0 security update 2014-10-01 18:10:39 EDT
Red Hat Product Errata RHSA-2015:0234 normal SHIPPED_LIVE Important: Red Hat JBoss BPM Suite 6.0.3 security update 2015-02-17 22:27:47 EST
Red Hat Product Errata RHSA-2015:0235 normal SHIPPED_LIVE Important: Red Hat JBoss BRMS 6.0.3 security update 2015-02-17 22:27:36 EST
Red Hat Product Errata RHSA-2015:0675 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.1.0 update 2015-03-11 16:51:21 EDT
Red Hat Product Errata RHSA-2015:0720 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse Service Works 6.0.0 security update 2015-03-24 21:05:53 EDT
Red Hat Product Errata RHSA-2015:0765 normal SHIPPED_LIVE Important: Red Hat JBoss Data Virtualization 6.0.0 security update 2015-03-31 17:00:43 EDT
Red Hat Product Errata RHSA-2015:1009 normal SHIPPED_LIVE Important: Red Hat JBoss Portal 6.2.0 update 2015-05-14 15:14:47 EDT

  None (edit)
Description Arun Babu Neelicattu 2014-04-29 22:19:19 EDT
It was found that due to a flaw in the WebSocket08FrameDecoder implementation a remote attacker can triggern a server side Out Of Memory Exception by issuing a series of TextWebSocketFrame and ContinuationWebSocketFrames. This may, depending on the server configuration, lead to a denial of service.
Comment 2 Norman Maurer 2014-04-30 15:17:04 EDT
Following releases are out and fix the problem:

4.0.19.Final
3.9.1.Final
3.8.2.Fianl
3.7.1.Final
3.6.9.Final
Comment 3 Martin Prpič 2014-05-07 05:26:47 EDT
Acknowledgements:

Red Hat would like to thank James Roper of Typesafe for reporting this issue.
Comment 5 Ryan Zhang 2014-05-08 22:38:13 EDT
Hi, Norman
Might I ask if netty 3.2.10.Final have this security issue ? is 3.2.10.Final out of this problem?
(In reply to Norman Maurer from comment #2)
> Following releases are out and fix the problem:
> 
> 4.0.19.Final
> 3.9.1.Final
> 3.8.2.Fianl
> 3.7.1.Final
> 3.6.9.Final
Comment 6 Norman Maurer 2014-05-09 00:08:44 EDT
No it is not affected as it not ship the websockets implementation.

(In reply to Ryan Zhang from comment #5)
> Hi, Norman
> Might I ask if netty 3.2.10.Final have this security issue ? is 3.2.10.Final
> out of this problem?
> (In reply to Norman Maurer from comment #2)
> > Following releases are out and fix the problem:
> > 
> > 4.0.19.Final
> > 3.9.1.Final
> > 3.8.2.Fianl
> > 3.7.1.Final
> > 3.6.9.Final
Comment 7 manstis 2014-05-09 07:22:44 EDT
Hi Norman,

Based on comment #6 could you please confirm if 3.2.6.Final was affected?

I assume it wasn't (as I assume 3.2.x lacked websockets support).

With kind regards,

Mike
Comment 8 Norman Maurer 2014-05-09 07:23:54 EDT
3.2.6.Final was NOT affected.

(In reply to manstis from comment #7)
> Hi Norman,
> 
> Based on comment #6 could you please confirm if 3.2.6.Final was affected?
> 
> I assume it wasn't (as I assume 3.2.x lacked websockets support).
> 
> With kind regards,
> 
> Mike
Comment 10 errata-xmlrpc 2014-06-30 16:52:38 EDT
This issue has been addressed in following products:

  JBoss BRMS 6.0.2

Via RHSA-2014:0818 https://rhn.redhat.com/errata/RHSA-2014-0818.html
Comment 12 Martin Prpič 2014-07-17 10:17:42 EDT
IssueDescription:

A flaw was found in the WebSocket08FrameDecoder implementation that could allow a remote attacker to trigger an Out Of Memory Exception by issuing a series of TextWebSocketFrame and ContinuationWebSocketFrames. Depending on the server configuration, this could lead to a denial of service.
Comment 13 errata-xmlrpc 2014-07-21 14:35:36 EDT
This issue has been addressed in following products:

  JBoss Operations Network 3.2.2

Via RHSA-2014:0910 https://rhn.redhat.com/errata/RHSA-2014-0910.html
Comment 14 errata-xmlrpc 2014-08-06 10:52:48 EDT
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 6.3.0

Via RHSA-2014:1021 https://rhn.redhat.com/errata/RHSA-2014-1021.html
Comment 15 errata-xmlrpc 2014-08-06 11:09:08 EDT
This issue has been addressed in following products:

  JBEAP 6 for RHEL 6

Via RHSA-2014:1020 https://rhn.redhat.com/errata/RHSA-2014-1020.html
Comment 16 errata-xmlrpc 2014-08-06 11:11:22 EDT
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5

Via RHSA-2014:1019 https://rhn.redhat.com/errata/RHSA-2014-1019.html
Comment 17 errata-xmlrpc 2014-10-01 14:10:55 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse/A-MQ 6.1.0

Via RHSA-2014:1351 https://rhn.redhat.com/errata/RHSA-2014-1351.html
Comment 19 errata-xmlrpc 2015-02-17 17:28:10 EST
This issue has been addressed in the following products:

  Red Hat JBoss BRMS 6.0.3

Via RHSA-2015:0235 https://rhn.redhat.com/errata/RHSA-2015-0235.html
Comment 20 errata-xmlrpc 2015-02-17 17:31:57 EST
This issue has been addressed in the following products:

  Red Hat JBoss BPM Suite 6.0.3

Via RHSA-2015:0234 https://rhn.redhat.com/errata/RHSA-2015-0234.html
Comment 23 errata-xmlrpc 2015-03-11 12:52:34 EDT
This issue has been addressed in the following products:

JBoss Data Virtualization 6.1.0

Via RHSA-2015:0675 https://rhn.redhat.com/errata/RHSA-2015-0675.html
Comment 24 errata-xmlrpc 2015-03-24 17:06:23 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Fuse Service Works 6.0.0

Via RHSA-2015:0720 https://rhn.redhat.com/errata/RHSA-2015-0720.html
Comment 25 errata-xmlrpc 2015-03-31 13:01:25 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Data Virtualization 6.0.0

Via RHSA-2015:0765 https://rhn.redhat.com/errata/RHSA-2015-0765.html
Comment 26 errata-xmlrpc 2015-05-14 11:17:29 EDT
This issue has been addressed in the following products:

  JBoss Portal 6.2.0

Via RHSA-2015:1009 https://rhn.redhat.com/errata/RHSA-2015-1009.html

Note You need to log in before you can comment on or make changes to this bug.