Bug 1573391 (CVE-2018-10237) - CVE-2018-10237 guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
Summary: CVE-2018-10237 guava: Unbounded memory allocation in AtomicDoubleArray and Co...
Status: NEW
Alias: CVE-2018-10237
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20180425,repor...
Keywords: Security
Depends On: 1573393 1592469 1592470 1592471 1573394 1573494 1573498 1573499 1574786 1576452 1576453 1582987 1582988 1582989 1582990 1582991 1582992 1582993 1591096 1592472
Blocks: 1573396
TreeView+ depends on / blocked
 
Reported: 2018-05-01 04:06 UTC by Sam Fowler
Modified: 2019-05-16 09:48 UTC (History)
111 users (show)

(edit)
A vulnerability was found in Guava where the AtomicDoubleArray and CompoundOrdering classes were found to allocate memory based on size fields sent by the client without validation. A crafted message could cause the server to consume all available memory or crash leading to a denial of service.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2423 None None None 2018-08-15 11:31 UTC
Red Hat Product Errata RHSA-2018:2424 None None None 2018-08-15 11:33 UTC
Red Hat Product Errata RHSA-2018:2425 None None None 2018-08-15 11:20 UTC
Red Hat Product Errata RHSA-2018:2428 None None None 2018-08-15 11:30 UTC
Red Hat Product Errata RHSA-2018:2598 None None None 2018-08-29 16:20 UTC
Red Hat Product Errata RHSA-2018:2643 None None None 2018-09-04 13:45 UTC
Red Hat Product Errata RHSA-2018:2740 None None None 2018-09-24 21:47 UTC
Red Hat Product Errata RHSA-2018:2741 None None None 2018-09-24 22:04 UTC
Red Hat Product Errata RHSA-2018:2742 None None None 2018-09-24 22:08 UTC
Red Hat Product Errata RHSA-2018:2743 None None None 2018-09-24 22:10 UTC
Red Hat Product Errata RHSA-2018:2927 None None None 2018-10-16 15:23 UTC

Description Sam Fowler 2018-05-01 04:06:46 UTC
Google Guava versions 11.0 through 24.1 are vulnerable to unbounded memory allocation in the AtomicDoubleArray class (when serialized with Java serialization) and Compound Ordering class (when serialized with GWT serialization). An attacker could exploit applications that use Guava and deserialize untrusted data to cause a denial of service.


External References:

https://github.com/google/guava/wiki/CVE-2018-10237
https://groups.google.com/forum/#!topic/guava-announce/xqWALw4W1vs/discussion


Upstream Patch:

https://github.com/google/guava/commit/7ec8718f1e6e2814dabaa4b9f96b6b33a813101c

Comment 1 Sam Fowler 2018-05-01 04:08:15 UTC
Created guava tracking bugs for this issue:

Affects: fedora-all [bug 1573394]

Comment 4 Michael Simacek 2018-05-02 13:14:43 UTC
Note there is guava20 compat package as well.

Comment 5 Sam Fowler 2018-05-04 03:40:19 UTC
Created guava20 tracking bugs for this issue:

Affects: fedora-28 [bug 1574786]

Comment 13 Scott Gayou 2018-06-18 16:02:17 UTC
Statement:

Red Hat Product Security has rated this issue as having a security impact of Moderate, and a future update may address this flaw.

Comment 17 errata-xmlrpc 2018-08-15 11:20:17 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2018:2425 https://access.redhat.com/errata/RHSA-2018:2425

Comment 18 errata-xmlrpc 2018-08-15 11:29:39 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.2.4 zip

Via RHSA-2018:2428 https://access.redhat.com/errata/RHSA-2018:2428

Comment 19 errata-xmlrpc 2018-08-15 11:30:45 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6

Via RHSA-2018:2423 https://access.redhat.com/errata/RHSA-2018:2423

Comment 20 errata-xmlrpc 2018-08-15 11:32:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7

Via RHSA-2018:2424 https://access.redhat.com/errata/RHSA-2018:2424

Comment 21 errata-xmlrpc 2018-08-29 16:20:15 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 (Queens)

Via RHSA-2018:2598 https://access.redhat.com/errata/RHSA-2018:2598

Comment 23 errata-xmlrpc 2018-09-04 13:44:59 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Via RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643

Comment 24 errata-xmlrpc 2018-09-24 21:46:30 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2018:2740 https://access.redhat.com/errata/RHSA-2018:2740

Comment 25 errata-xmlrpc 2018-09-24 22:04:21 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7

Via RHSA-2018:2741 https://access.redhat.com/errata/RHSA-2018:2741

Comment 26 errata-xmlrpc 2018-09-24 22:08:15 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5

Via RHSA-2018:2742 https://access.redhat.com/errata/RHSA-2018:2742

Comment 27 errata-xmlrpc 2018-09-24 22:09:37 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6

Via RHSA-2018:2743 https://access.redhat.com/errata/RHSA-2018:2743

Comment 29 errata-xmlrpc 2018-10-16 15:22:28 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.4 for RHEL 7

Via RHSA-2018:2927 https://access.redhat.com/errata/RHSA-2018:2927

Comment 32 Joshua Padman 2019-05-15 22:56:44 UTC
This vulnerability is out of security support scope for the following product:
 * Red Hat JBoss Data Virtualization & Services 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.


Note You need to log in before you can comment on or make changes to this bug.