https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Bug ID: 1798524 Summary: CVE-2019-20444 netty: HTTP request smuggling Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: medium Priority: medium Assignee: security-response-team@redhat.com Reporter: darunesh@redhat.com CC: aboyko@redhat.com, aileenc@redhat.com, akoufoud@redhat.com, alazarot@redhat.com, almorale@redhat.com, anstephe@redhat.com, aos-bugs@redhat.com, asoldano@redhat.com, atangrin@redhat.com, ataylor@redhat.com, avibelli@redhat.com, bbaranow@redhat.com, bbuckingham@redhat.com, bcourt@redhat.com, bgeorges@redhat.com, bkearney@redhat.com, bmaxwell@redhat.com, bmontgom@redhat.com, brian.stansberry@redhat.com, btotty@redhat.com, cdewolf@redhat.com, chazlett@redhat.com, darran.lofthouse@redhat.com, decathorpe@gmail.com, dkreling@redhat.com, dosoudil@redhat.com, drieden@redhat.com, eparis@redhat.com, etirelli@redhat.com, ganandan@redhat.com, ggaughan@redhat.com, hhudgeon@redhat.com, ibek@redhat.com, iweiss@redhat.com, janstey@redhat.com, java-sig-commits@lists.fedoraproject.org, jawilson@redhat.com, jbalunas@redhat.com, jburrell@redhat.com, jcantril@redhat.com, jerboaa@gmail.com, jochrist@redhat.com, jokerman@redhat.com, jpallich@redhat.com, jperkins@redhat.com, jross@redhat.com, jstastny@redhat.com, jwon@redhat.com, krathod@redhat.com, kverlaen@redhat.com, kwills@redhat.com, lgao@redhat.com, loleary@redhat.com, lthon@redhat.com, lzap@redhat.com, mmccune@redhat.com, mnovotny@redhat.com, msochure@redhat.com, msvehla@redhat.com, mszynkie@redhat.com, nstielau@redhat.com, nwallace@redhat.com, paradhya@redhat.com, pdrozd@redhat.com, pgallagh@redhat.com, pjindal@redhat.com, pmackay@redhat.com, psotirop@redhat.com, rchan@redhat.com, rguimara@redhat.com, rjerrido@redhat.com, rrajasek@redhat.com, rruss@redhat.com, rsvoboda@redhat.com, rsynek@redhat.com, sdaley@redhat.com, smaestri@redhat.com, sochotni@redhat.com, sokeeffe@redhat.com, spinder@redhat.com, sponnaga@redhat.com, stewardship-sig@lists.fedoraproject.org, sthorger@redhat.com, tbrisker@redhat.com, theute@redhat.com, tom.jenkinson@redhat.com Target Milestone: --- Classification: Other
A vulnerability was found in HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold."
Reference: https://github.com/netty/netty/issues/9866 https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Fin...
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Dhananjay Arunesh darunesh@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1798525
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1798525 [Bug 1798525] CVE-2019-20444 netty: HTTP request smuggling [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #1 from Dhananjay Arunesh darunesh@redhat.com --- Created netty tracking bugs for this issue:
Affects: fedora-all [bug 1798525]
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Dhananjay Arunesh darunesh@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1798529
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Jonathan Christison jochrist@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Priority|medium |high Severity|medium |high
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #3 from Jason Shepherd jshepherd@redhat.com --- Statement:
OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we're reducing the impact of this issue to moderate and may fix it in the future release.
[1] https://github.com/elastic/elasticsearch/issues/49396
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed In Version| |netty 4.1.44
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Jason Shepherd jshepherd@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1798773, 1798769, 1798771, | |1798770, 1798772
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Jonathan Christison jochrist@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |rgodfrey@redhat.com, | |swoodman@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #9 from Jonathan Christison jochrist@redhat.com --- Mitigation:
* Use HTTP/2 instead (clear boundaries between requests) * Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Rodrigo A B Freire rfreire@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |rfreire@redhat.com Flags| |needinfo?(darunesh@redhat.c | |om)
--- Comment #10 from Rodrigo A B Freire rfreire@redhat.com --- Hi Darunesh,
the Reported date is wrong - states year of 2019 but it is 2020.
Can you please fix it?
Thanks.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #11 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat AMQ Online 1.3.3 GA
Via RHSA-2020:0497 https://access.redhat.com/errata/RHSA-2020:0497
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0497
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Product Security DevOps Team prodsec-dev@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |ERRATA Last Closed| |2020-02-13 20:09:52
--- Comment #12 from Product Security DevOps Team prodsec-dev@redhat.com --- This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):
https://access.redhat.com/security/cve/cve-2019-20444
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Dhananjay Arunesh darunesh@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(darunesh@redhat.c | |om) |
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Doc Text *updated* by Jonathan Christison jochrist@redhat.com --- It was found Netty before 4.1.44 was found to accept headers HTTP headers with an invalid fold, in this case CRLF (Carriage Return, Line Feed) without being followed by SP(Space) or HTAB (Horizontal Tab) , this can result in situations where headers can be misread as it does not follow standards set by RFC7230 section 3.2.
In circumstances where Netty is used in the context of a server it could result in a viable http smuggling vulnerability.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Doc Text *updated* by Eric Christensen sparks@redhat.com --- A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #16 from Eric Christensen sparks@redhat.com --- Statement:
OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we're reducing the impact of this issue to moderate and may fix it in the future release.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #17 from Eric Christensen sparks@redhat.com --- External References:
https://github.com/elastic/elasticsearch/issues/49396
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #18 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
AMQ Clients 2.y for RHEL 7 AMQ Clients 2.y for RHEL 8 AMQ Clients 2.y for RHEL 6
Via RHSA-2020:0601 https://access.redhat.com/errata/RHSA-2020:0601
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0601
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #19 from Cedric Buissart 🐶 cbuissar@redhat.com --- Statement:
OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch's security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we're reducing the impact of this issue to moderate and may fix it in the future release.
Red Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #23 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Openshift Application Runtimes
Via RHSA-2020:0567 https://access.redhat.com/errata/RHSA-2020:0567
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0567
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #25 from Jonathan Christison jochrist@redhat.com --- Marking AMQ-6 as low as it only uses netty in the context of integration tests, activemq components do not directly rely upon netty.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #27 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat JBoss Enterprise Application Platform
Via RHSA-2020:0811 https://access.redhat.com/errata/RHSA-2020:0811
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0811
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #28 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 8
Via RHSA-2020:0806 https://access.redhat.com/errata/RHSA-2020:0806
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0806
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #29 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6
Via RHSA-2020:0804 https://access.redhat.com/errata/RHSA-2020:0804
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0804
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #30 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7
Via RHSA-2020:0805 https://access.redhat.com/errata/RHSA-2020:0805
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0805
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #31 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat AMQ
Via RHSA-2020:0922 https://access.redhat.com/errata/RHSA-2020:0922
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0922
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #32 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat JBoss AMQ
Via RHSA-2020:0939 https://access.redhat.com/errata/RHSA-2020:0939
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0939
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #33 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Single Sign-On
Via RHSA-2020:0951 https://access.redhat.com/errata/RHSA-2020:0951
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:0951
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #34 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat AMQ 7.4.3
Via RHSA-2020:1445 https://access.redhat.com/errata/RHSA-2020:1445
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:1445
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #35 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Data Grid 7.3.6
Via RHSA-2020:2321 https://access.redhat.com/errata/RHSA-2020:2321
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:2321
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #36 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
EAP-CD 19 Tech Preview
Via RHSA-2020:2333 https://access.redhat.com/errata/RHSA-2020:2333
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:2333
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #37 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Fuse 7.7.0
Via RHSA-2020:3192 https://access.redhat.com/errata/RHSA-2020:3192
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3192
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #38 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Decision Manager
Via RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3196
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #39 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Process Automation
Via RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2020:3197
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
--- Comment #40 from Jonathan Christison jochrist@redhat.com --- Marking Red Hat Jboss Fuse 6 as having a moderate impact, Fuse 6 distributes affected versions of Netty, however its use in Fuse 6 fabric-gateway is not susceptible to the vulnerability as the fabric-gateway will create a new http client upon each gateway invocation, this means there is no multiplexing of connections, this is a prerequisite of HTTP smuggling/desynchronisation attacks.
This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6
Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Yadnyawalk Tale ytale@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1866342
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Yadnyawalk Tale ytale@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On|1866342 |
https://bugzilla.redhat.com/show_bug.cgi?id=1798524 Bug 1798524 depends on bug 1798525, which changed state.
Bug 1798525 Summary: CVE-2019-20444 netty: HTTP request smuggling [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1798525
What |Removed |Added ---------------------------------------------------------------------------- Status|ON_QA |CLOSED Resolution|--- |ERRATA
https://bugzilla.redhat.com/show_bug.cgi?id=1798524
Jonathan Christison jochrist@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |gmalinko@redhat.com
--- Comment #42 from Jonathan Christison jochrist@redhat.com --- Marking Red Hat Fuse 7 as having a low impact, Fuse 7 distributes affected versions of Netty in the Karaf Narayana transaction manager, however the vulnerable functionality of these artifacts is not used.
java-sig-commits@lists.fedoraproject.org