Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAPNiXbG8-Z7BC=pts=EigRo0yNnvFU+GV6pBNQhKt9HpxFfu2g@mail.gmail.com>
Date: Thu, 13 Sep 2018 16:52:53 +0200
From: Alex R <alexr@...che.org>
To: dev <dev@...os.apache.org>, user <user@...os.apache.org>, 
	Amon Flair <amon@...dynarwhals.org>, Lyon Yang <lyon.yang.s@...il.com>, 
	security <security@...che.org>, oss-security@...ts.openwall.com, 
	Yeo Quan Yang <quanyang@...e.com>
Subject: CVE-2018-1330: Libprocess might crash when decoding malformed HTTP
 requests or malformed JSON payload.

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Mesos 1.4.0 to 1.5.0
The unsupported Apache Mesos pre-1.4.0 releases may be also affected.

Description:
When parsing a malformed JSON payload, libprocess might crash due to
an uncaught exception. Parsing chunked HTTP requests with trailers
can lead to a libprocess crash too because of the mistakenly planted
assertion. A malicious actor can therefore cause a denial of service
of Mesos masters rendering the Mesos-controlled cluster inoperable.

Mitigation:
pre-1.4.x users should upgrade to at least 1.4.2
1.4.x users should upgrade to 1.4.2
1.5.0 users should upgrade to 1.5.1
1.6.0-dev users should obtain Mesos 1.6.0 or later

Credit:
This issue was discovered by Lyon Yang (@l0Op3r), Jeremy Heng
(@nn\_amon) and Quan Yang (@quanyang).

Alex on behalf of Mesos PMC.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.