Bug 830248 - (CVE-2012-2685) CVE-2012-2685 cumin: DoS via large image requests
CVE-2012-2685 cumin: DoS via large image requests
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 840118 858868
Blocks: 808230 828434 828935
  Show dependency treegraph
Reported: 2012-06-08 12:06 EDT by Vincent Danen
Modified: 2012-09-19 17:10 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 840118 (view as bug list)
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2012-06-08 12:06:03 EDT
Florian Weimer reported a denial of service condition in Cumin.  Clients could request images of an arbitrary size, which would lead to large memory allocations on the server.  This could lead to an out of memory condition, which could potentially consume all available memory on the Cumin server.
Comment 2 Trevor McKay 2012-06-08 13:15:53 EDT
Note, this flaw no longer exists on trunk, but it does exist in previous releases.
Comment 3 Vincent Danen 2012-09-19 11:57:57 EDT

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Comment 4 errata-xmlrpc 2012-09-19 13:43:49 EDT
This issue has been addressed in following products:

  MRG for RHEL-5 v. 2

Via RHSA-2012:1278 https://rhn.redhat.com/errata/RHSA-2012-1278.html
Comment 5 errata-xmlrpc 2012-09-19 13:52:55 EDT
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2012:1281 https://rhn.redhat.com/errata/RHSA-2012-1281.html
Comment 6 Vincent Danen 2012-09-19 17:10:40 EDT
Created cumin tracking bugs for this issue

Affects: fedora-all [bug 858868]

Note You need to log in before you can comment on or make changes to this bug.