Bug 945190 - (CVE-2015-5262) VUL-0: CVE-2015-5262: apache-commons-httpclient, httpcomponents-core: missing HTTPS connection timeout
(CVE-2015-5262)
VUL-0: CVE-2015-5262: apache-commons-httpclient, httpcomponents-core: missing...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other SLES 15
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/156468/
CVSSv3.1:SUSE:CVE-2015-5262:7.5:(AV:N...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-09-10 07:48 UTC by Victor Pereira
Modified: 2022-06-10 10:23 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2015-09-10 07:48:35 UTC
rh#1261538

It was discovered that Apache HttpClient did not apply a configured
connection or read timeout during the initial handshake of an HTTPS
connection.  As a result, HTTPS connection could get stuck, causing
a denial of service if multiple such connections accumulate.


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1261538
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5262
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262
Comment 1 Tomáš Chvátal 2015-09-10 10:16:42 UTC
I don't see us affected anywhere.

We have version 3.1...
Comment 2 Swamp Workflow Management 2015-09-10 22:00:26 UTC
bugbot adjusting priority
Comment 3 Johannes Segitz 2017-08-10 13:57:08 UTC
agreed, that doesn't affect us
Comment 4 Pedro Monreal Gonzalez 2020-10-27 10:13:52 UTC
We have apache-commons-httpclient version 3.1 in:
   SUSE_SLE-12_Update
   SUSE_SLE-15_Update
   SUSE_SLE-15-SP2_Update

Patches from Fedora and Debian:
   https://src.fedoraproject.org/rpms/jakarta-commons-httpclient/blob/master/f/0005-CVE-2015-5262.patch
   https://sources.debian.org/src/commons-httpclient/3.1-15/debian/patches/CVE-2015-5262.patch/
Comment 7 Swamp Workflow Management 2020-11-04 14:15:01 UTC
SUSE-SU-2020:3149-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1178171,945190
CVE References: CVE-2014-3577,CVE-2015-5262
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE OpenStack Cloud Crowbar 8 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE OpenStack Cloud 9 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE OpenStack Cloud 8 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE OpenStack Cloud 7 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP5 (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    apache-commons-httpclient-3.1-6.3.1
SUSE Enterprise Storage 5 (src):    apache-commons-httpclient-3.1-6.3.1
HPE Helion Openstack 8 (src):    apache-commons-httpclient-3.1-6.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2020-11-04 14:16:05 UTC
SUSE-SU-2020:3151-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1178171,945190
CVE References: CVE-2014-3577,CVE-2015-5262
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    apache-commons-httpclient-3.1-4.3.2
SUSE Linux Enterprise Server 15-LTSS (src):    apache-commons-httpclient-3.1-4.3.2
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    apache-commons-httpclient-3.1-4.3.2
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    apache-commons-httpclient-3.1-4.3.2
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    apache-commons-httpclient-3.1-4.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2020-11-04 14:19:20 UTC
SUSE-SU-2020:3152-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1178171,945190
CVE References: CVE-2014-3577,CVE-2015-5262
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    apache-commons-httpclient-3.1-11.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2020-11-07 17:15:44 UTC
openSUSE-SU-2020:1873-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1178171,945190
CVE References: CVE-2014-3577,CVE-2015-5262
JIRA References: 
Sources used:
openSUSE Leap 15.1 (src):    apache-commons-httpclient-3.1-lp151.4.3.1
Comment 11 Swamp Workflow Management 2020-11-08 11:14:52 UTC
openSUSE-SU-2020:1875-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 1178171,945190
CVE References: CVE-2014-3577,CVE-2015-5262
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    apache-commons-httpclient-3.1-lp152.6.3.1
Comment 12 Carlos López 2022-06-10 10:23:08 UTC
Done, closing.