Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1438885 - (CVE-2017-2670) CVE-2017-2670 undertow: IO thread DoS via unclean Websocket closing
CVE-2017-2670 undertow: IO thread DoS via unclean Websocket closing
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170607,repor...
: Security
: 1438764 (view as bug list)
Depends On:
Blocks: 1438765 1520314
  Show dependency treegraph
 
Reported: 2017-04-04 12:12 EDT by Bharti Kundal
Modified: 2018-07-26 23:49 EDT (History)
29 users (show)

See Also:
Fixed In Version: undertow-core 1.3.28.Final-redhat-4
Doc Type: If docs needed, set a value
Doc Text:
It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-04-19 16:56:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1409 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform security update 2017-06-07 16:37:27 EDT
Red Hat Product Errata RHSA-2017:1410 normal SHIPPED_LIVE Moderate: JBoss Enterprise Application Platform 7.0.6 on Red Hat Enterprise Linux 6 2017-06-07 17:00:45 EDT
Red Hat Product Errata RHSA-2017:1411 normal SHIPPED_LIVE Moderate: JBoss Enterprise Application Platform 7.0.6 on Red Hat Enterprise Linux 7 2017-06-07 16:58:48 EDT
Red Hat Product Errata RHSA-2017:1412 normal SHIPPED_LIVE Moderate: eap7-jboss-ec2-eap security update 2017-06-07 17:22:17 EDT
Red Hat Product Errata RHSA-2017:3454 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:48:09 EST
Red Hat Product Errata RHSA-2017:3455 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:57:25 EST
Red Hat Product Errata RHSA-2017:3456 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.1.0 security update 2017-12-13 17:31:03 EST
Red Hat Product Errata RHSA-2017:3458 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2017-12-13 18:26:13 EST

  None (edit)
Description Bharti Kundal 2017-04-04 12:12:56 EDT
It was found that with non-clean TCP close, Websocket server gets into infinite loop on every IO thread, effectively causing DoS.

Vulnerable code:

https://github.com/undertow-io/undertow/blob/1.4.12.Final/core/src/main/java/io/undertow/server/protocol/framed/AbstractFramedStreamSourceChannel.java#L288
Comment 2 Bharti Kundal 2017-04-04 14:51:30 EDT
*** Bug 1438764 has been marked as a duplicate of this bug. ***
Comment 3 Bharti Kundal 2017-04-06 14:52:50 EDT
Acknowledgments:

Name: Gregory Ramsperger, Ryan Moak
Comment 4 errata-xmlrpc 2017-06-07 12:38:56 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0.6

Via RHSA-2017:1409 https://rhn.redhat.com/errata/RHSA-2017-1409.html
Comment 5 errata-xmlrpc 2017-06-07 13:05:14 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2017:1411 https://access.redhat.com/errata/RHSA-2017:1411
Comment 6 errata-xmlrpc 2017-06-07 13:06:17 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:1410 https://access.redhat.com/errata/RHSA-2017:1410
Comment 7 errata-xmlrpc 2017-06-07 13:23:34 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:1412 https://access.redhat.com/errata/RHSA-2017:1412
Comment 10 Markus Koschany 2017-06-10 17:41:45 EDT
Can you share more information about the issue and your proposed patch for it? There were no changes made to

https://github.com/undertow-io/undertow/blob/1.4.12.Final/core/src/main/java/io/undertow/server/protocol/framed/AbstractFramedStreamSourceChannel.java#L288

in the past months hence I wonder how other users and distributions of undertow are supposed to address this bug.

The same goes for CVE-2017-2666. I would appreciate it if you could share more details about the vulnerability and the fix.
Comment 13 errata-xmlrpc 2017-12-13 12:35:25 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2017:3456 https://access.redhat.com/errata/RHSA-2017:3456
Comment 14 errata-xmlrpc 2017-12-13 13:27:25 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3454 https://access.redhat.com/errata/RHSA-2017:3454
Comment 15 errata-xmlrpc 2017-12-13 13:43:19 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2017:3455 https://access.redhat.com/errata/RHSA-2017:3455
Comment 16 errata-xmlrpc 2017-12-13 13:50:22 EST
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2017:3458 https://access.redhat.com/errata/RHSA-2017:3458

Note You need to log in before you can comment on or make changes to this bug.