Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-9823
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Eclipse Foundation | Jetty |
Version: 9.0.0 Version: 10.0.0 Version: 11.0.0 ≤ |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "jetty", "vendor": "eclipse", "versions": [ { "lessThan": "9.4.54", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.0.18", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.0.18", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9823", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:46:11.062398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:49:38.804Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-servlets" ], "packageName": "org.eclipse.jetty:jetty-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Foundation", "versions": [ { "lessThan": "9.4.54", "status": "affected", "version": "9.0.0", "versionType": "semvar" }, { "lessThan": "10.0.18", "status": "affected", "version": "10.0.0", "versionType": "semvar" }, { "lessThan": "11.0.18", "status": "affected", "version": "11.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee8-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee8-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semvar" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee9-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee9-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee10-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee10-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semvar" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Lian Kee" } ], "datePublic": "2024-10-14T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\u003cbr\u003e" } ], "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T15:29:14.390Z", "orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "shortName": "eclipse" }, "references": [ { "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" }, { "url": "https://github.com/jetty/jetty.project/issues/1256" } ], "source": { "discovery": "UNKNOWN" }, "title": "Jetty DOS vulnerability on DosFilter", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The \u003ccode\u003eDoSFilter\u003c/code\u003e can be configured to not use sessions for tracking usage by setting the \u003ccode\u003etrackSessions\u003c/code\u003e init parameter to \u003ccode\u003efalse\u003c/code\u003e. This will then use only the IP tracking mechanism, which is not vulnerable.\u003cbr\u003e\nSessions can also be configured to have aggressive passivation or inactivation limits.\u003cbr\u003e" } ], "value": "The DoSFilter can be configured to not use sessions for tracking usage by setting the trackSessions init parameter to false. This will then use only the IP tracking mechanism, which is not vulnerable.\n\nSessions can also be configured to have aggressive passivation or inactivation limits." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "assignerShortName": "eclipse", "cveId": "CVE-2024-9823", "datePublished": "2024-10-14T15:03:02.293Z", "dateReserved": "2024-10-10T15:56:32.744Z", "dateUpdated": "2024-10-15T17:49:38.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-9823\",\"sourceIdentifier\":\"emo@eclipse.org\",\"published\":\"2024-10-14T15:15:14.560\",\"lastModified\":\"2024-10-15T12:57:46.880\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de seguridad en el DosFilter de Jetty que puede ser explotada por usuarios no autorizados para provocar un ataque de denegaci\u00f3n de servicio (DoS) remoto en el servidor mediante el DosFilter. Al enviar repetidamente solicitudes manipuladas, los atacantes pueden generar errores OutofMemory y agotar la memoria del servidor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"references\":[{\"url\":\"https://github.com/jetty/jetty.project/issues/1256\",\"source\":\"emo@eclipse.org\"},{\"url\":\"https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h\",\"source\":\"emo@eclipse.org\"},{\"url\":\"https://gitlab.eclipse.org/security/cve-assignement/-/issues/39\",\"source\":\"emo@eclipse.org\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-9823\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T17:46:11.062398Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\"], \"vendor\": \"eclipse\", \"product\": \"jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"lessThan\": \"9.4.54\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.18\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.0.0\", \"lessThan\": \"11.0.18\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-15T17:49:30.657Z\"}}], \"cna\": {\"title\": \"Jetty DOS vulnerability on DosFilter\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Lian Kee\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Foundation\", \"modules\": [\"jetty-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"lessThan\": \"9.4.54\", \"versionType\": \"semvar\"}, {\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.18\", \"versionType\": \"semvar\"}, {\"status\": \"affected\", \"version\": \"11.0.0\", \"lessThan\": \"11.0.18\", \"versionType\": \"semver\"}], \"packageName\": \"org.eclipse.jetty:jetty-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee8-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semvar\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee8-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee9-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semver\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee9-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee10-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semvar\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee10-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-10-14T15:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h\"}, {\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/39\"}, {\"url\": \"https://github.com/jetty/jetty.project/issues/1256\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"The DoSFilter can be configured to not use sessions for tracking usage by setting the trackSessions init parameter to false. This will then use only the IP tracking mechanism, which is not vulnerable.\\n\\nSessions can also be configured to have aggressive passivation or inactivation limits.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The \u003ccode\u003eDoSFilter\u003c/code\u003e can be configured to not use sessions for tracking usage by setting the \u003ccode\u003etrackSessions\u003c/code\u003e init parameter to \u003ccode\u003efalse\u003c/code\u003e. This will then use only the IP tracking mechanism, which is not vulnerable.\u003cbr\u003e\\nSessions can also be configured to have aggressive passivation or inactivation limits.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"shortName\": \"eclipse\", \"dateUpdated\": \"2024-10-14T15:29:14.390Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-9823\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-15T17:49:38.804Z\", \"dateReserved\": \"2024-10-10T15:56:32.744Z\", \"assignerOrgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"datePublished\": \"2024-10-14T15:03:02.293Z\", \"assignerShortName\": \"eclipse\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2024-3176
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Eclipse Jetty ist ein Java-HTTP-Server und Java-Servlet-Container.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Eclipse Jetty ausnutzen, um einen Denial of Service Angriff zu erzeugen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3176 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3176.json" }, { "category": "self", "summary": "WID-SEC-2024-3176 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3176" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00193.html" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00194.html" }, { "category": "external", "summary": "GitHub Advisory vom 2024-10-14", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3720-1 vom 2024-10-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O3QVMQNMY7KSISCQZHRID4KVIGDCRX47/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14408-1 vom 2024-10-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BNU3R7DW4USCKK4UHDLFZ57HXWYZNOCE/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "IBM Security Bulletin 7176904 vom 2024-12-06", "url": "https://www.ibm.com/support/pages/node/7176904" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11023 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:11023" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2702 vom 2024-12-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2702.html" } ], "source_lang": "en-US", "title": "Eclipse Jetty: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-19T23:00:00.000+00:00", "generator": { "date": "2024-12-20T09:13:42.053+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3176", "initial_release_date": "2024-10-14T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.0.9", "product": { "name": "Eclipse Jetty \u003c12.0.9", "product_id": "T038318" } }, { "category": "product_version", "name": "12.0.9", "product": { "name": "Eclipse Jetty 12.0.9", "product_id": "T038318-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.9" } } }, { "category": "product_version_range", "name": "\u003c10.0.24", "product": { "name": "Eclipse Jetty \u003c10.0.24", "product_id": "T038319" } }, { "category": "product_version", "name": "10.0.24", "product": { "name": "Eclipse Jetty 10.0.24", "product_id": "T038319-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.24" } } }, { "category": "product_version_range", "name": "\u003c11.0.24", "product": { "name": "Eclipse Jetty \u003c11.0.24", "product_id": "T038320" } }, { "category": "product_version", "name": "11.0.24", "product": { "name": "Eclipse Jetty 11.0.24", "product_id": "T038320-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.24" } } }, { "category": "product_version_range", "name": "\u003c9.4.56", "product": { "name": "Eclipse Jetty \u003c9.4.56", "product_id": "T038321" } }, { "category": "product_version", "name": "9.4.56", "product": { "name": "Eclipse Jetty 9.4.56", "product_id": "T038321-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.56" } } }, { "category": "product_version_range", "name": "\u003c12.0.3", "product": { "name": "Eclipse Jetty \u003c12.0.3", "product_id": "T038322" } }, { "category": "product_version", "name": "12.0.3", "product": { "name": "Eclipse Jetty 12.0.3", "product_id": "T038322-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.3" } } }, { "category": "product_version_range", "name": "\u003c9.4.54", "product": { "name": "Eclipse Jetty \u003c9.4.54", "product_id": "T038323" } }, { "category": "product_version", "name": "9.4.54", "product": { "name": "Eclipse Jetty 9.4.54", "product_id": "T038323-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.54" } } }, { "category": "product_version_range", "name": "\u003c10.0.18", "product": { "name": "Eclipse Jetty \u003c10.0.18", "product_id": "T038324" } }, { "category": "product_version", "name": "10.0.18", "product": { "name": "Eclipse Jetty 10.0.18", "product_id": "T038324-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.18" } } }, { "category": "product_version_range", "name": "\u003c11.0.18", "product": { "name": "Eclipse Jetty \u003c11.0.18", "product_id": "T038325" } }, { "category": "product_version", "name": "11.0.18", "product": { "name": "Eclipse Jetty 11.0.18", "product_id": "T038325-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.18" } } }, { "category": "product_version_range", "name": "\u003c12.0.4", "product": { "name": "Eclipse Jetty \u003c12.0.4", "product_id": "T038326" } }, { "category": "product_version", "name": "12.0.4", "product": { "name": "Eclipse Jetty 12.0.4", "product_id": "T038326-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.4" } } }, { "category": "product_version_range", "name": "\u003c12.0.12", "product": { "name": "Eclipse Jetty \u003c12.0.12", "product_id": "T038327" } }, { "category": "product_version", "name": "12.0.12", "product": { "name": "Eclipse Jetty 12.0.12", "product_id": "T038327-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.12" } } } ], "category": "product_name", "name": "Jetty" } ], "category": "vendor", "name": "Eclipse" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6762", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Diese Schwachstelle betrifft den Jetty PushSessionCacheFilter und erm\u00f6glicht eine Speicherersch\u00f6pfung. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T002207", "67646", "444803", "T027843", "T038324", "T038325", "398363", "T038326", "T038322" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6762" }, { "cve": "CVE-2024-6763", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Dieser Fehler besteht in der HttpURI-Klasse, wenn sie als Dienstprogrammklasse in einer Anwendung verwendet wird, da das Autorit\u00e4tssegment eines URIs nicht ausreichend validiert wird, wodurch Open-Redirect- oder Server-Side-Request- Forgery-Angriffe m\u00f6glich sind. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen b\u00f6sartigen URI zu erstellen, der das Verhalten des Servers manipulieren kann." } ], "product_status": { "known_affected": [ "T002207", "67646", "T038318", "444803", "T027843", "398363", "T038326", "T038327", "T038322" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2024-8184", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Diese Schwachstelle betrifft die Funktion Jetty ThreadLimitHandler.getRemote aufgrund einer unsachgem\u00e4\u00dfen Handhabung der Ressourcenverwaltung, die zu einem Out-of-Memory-Fehler f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er zahlreiche b\u00f6sartige Anfragen sendet." } ], "product_status": { "known_affected": [ "67646", "T038318", "T038319", "T038324", "T038325", "T038326", "T038320", "T038321", "T038322", "T038323", "T002207", "444803", "T027843", "398363" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-8184" }, { "cve": "CVE-2024-9823", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Dieser Fehler betrifft den DoSFilter aufgrund einer unsachgem\u00e4\u00dfen internen Anforderungsverfolgung, die eine Auslastung des Speichers erm\u00f6glicht. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er manipulierte Anfragen sendet." } ], "product_status": { "known_affected": [ "T002207", "67646", "444803", "T027843", "T038324", "T038325", "398363", "T038322", "T038323" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-9823" } ] }
wid-sec-w-2024-3176
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Eclipse Jetty ist ein Java-HTTP-Server und Java-Servlet-Container.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Eclipse Jetty ausnutzen, um einen Denial of Service Angriff zu erzeugen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3176 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3176.json" }, { "category": "self", "summary": "WID-SEC-2024-3176 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3176" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00193.html" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00194.html" }, { "category": "external", "summary": "GitHub Advisory vom 2024-10-14", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3720-1 vom 2024-10-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O3QVMQNMY7KSISCQZHRID4KVIGDCRX47/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14408-1 vom 2024-10-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BNU3R7DW4USCKK4UHDLFZ57HXWYZNOCE/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "IBM Security Bulletin 7176904 vom 2024-12-06", "url": "https://www.ibm.com/support/pages/node/7176904" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11023 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:11023" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2702 vom 2024-12-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2702.html" } ], "source_lang": "en-US", "title": "Eclipse Jetty: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-19T23:00:00.000+00:00", "generator": { "date": "2024-12-20T09:13:42.053+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3176", "initial_release_date": "2024-10-14T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.0.9", "product": { "name": "Eclipse Jetty \u003c12.0.9", "product_id": "T038318" } }, { "category": "product_version", "name": "12.0.9", "product": { "name": "Eclipse Jetty 12.0.9", "product_id": "T038318-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.9" } } }, { "category": "product_version_range", "name": "\u003c10.0.24", "product": { "name": "Eclipse Jetty \u003c10.0.24", "product_id": "T038319" } }, { "category": "product_version", "name": "10.0.24", "product": { "name": "Eclipse Jetty 10.0.24", "product_id": "T038319-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.24" } } }, { "category": "product_version_range", "name": "\u003c11.0.24", "product": { "name": "Eclipse Jetty \u003c11.0.24", "product_id": "T038320" } }, { "category": "product_version", "name": "11.0.24", "product": { "name": "Eclipse Jetty 11.0.24", "product_id": "T038320-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.24" } } }, { "category": "product_version_range", "name": "\u003c9.4.56", "product": { "name": "Eclipse Jetty \u003c9.4.56", "product_id": "T038321" } }, { "category": "product_version", "name": "9.4.56", "product": { "name": "Eclipse Jetty 9.4.56", "product_id": "T038321-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.56" } } }, { "category": "product_version_range", "name": "\u003c12.0.3", "product": { "name": "Eclipse Jetty \u003c12.0.3", "product_id": "T038322" } }, { "category": "product_version", "name": "12.0.3", "product": { "name": "Eclipse Jetty 12.0.3", "product_id": "T038322-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.3" } } }, { "category": "product_version_range", "name": "\u003c9.4.54", "product": { "name": "Eclipse Jetty \u003c9.4.54", "product_id": "T038323" } }, { "category": "product_version", "name": "9.4.54", "product": { "name": "Eclipse Jetty 9.4.54", "product_id": "T038323-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.54" } } }, { "category": "product_version_range", "name": "\u003c10.0.18", "product": { "name": "Eclipse Jetty \u003c10.0.18", "product_id": "T038324" } }, { "category": "product_version", "name": "10.0.18", "product": { "name": "Eclipse Jetty 10.0.18", "product_id": "T038324-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.18" } } }, { "category": "product_version_range", "name": "\u003c11.0.18", "product": { "name": "Eclipse Jetty \u003c11.0.18", "product_id": "T038325" } }, { "category": "product_version", "name": "11.0.18", "product": { "name": "Eclipse Jetty 11.0.18", "product_id": "T038325-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.18" } } }, { "category": "product_version_range", "name": "\u003c12.0.4", "product": { "name": "Eclipse Jetty \u003c12.0.4", "product_id": "T038326" } }, { "category": "product_version", "name": "12.0.4", "product": { "name": "Eclipse Jetty 12.0.4", "product_id": "T038326-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.4" } } }, { "category": "product_version_range", "name": "\u003c12.0.12", "product": { "name": "Eclipse Jetty \u003c12.0.12", "product_id": "T038327" } }, { "category": "product_version", "name": "12.0.12", "product": { "name": "Eclipse Jetty 12.0.12", "product_id": "T038327-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.12" } } } ], "category": "product_name", "name": "Jetty" } ], "category": "vendor", "name": "Eclipse" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6762", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Diese Schwachstelle betrifft den Jetty PushSessionCacheFilter und erm\u00f6glicht eine Speicherersch\u00f6pfung. Ein entfernter, authentisierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T002207", "67646", "444803", "T027843", "T038324", "T038325", "398363", "T038326", "T038322" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6762" }, { "cve": "CVE-2024-6763", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Dieser Fehler besteht in der HttpURI-Klasse, wenn sie als Dienstprogrammklasse in einer Anwendung verwendet wird, da das Autorit\u00e4tssegment eines URIs nicht ausreichend validiert wird, wodurch Open-Redirect- oder Server-Side-Request- Forgery-Angriffe m\u00f6glich sind. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen b\u00f6sartigen URI zu erstellen, der das Verhalten des Servers manipulieren kann." } ], "product_status": { "known_affected": [ "T002207", "67646", "T038318", "444803", "T027843", "398363", "T038326", "T038327", "T038322" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2024-8184", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Diese Schwachstelle betrifft die Funktion Jetty ThreadLimitHandler.getRemote aufgrund einer unsachgem\u00e4\u00dfen Handhabung der Ressourcenverwaltung, die zu einem Out-of-Memory-Fehler f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er zahlreiche b\u00f6sartige Anfragen sendet." } ], "product_status": { "known_affected": [ "67646", "T038318", "T038319", "T038324", "T038325", "T038326", "T038320", "T038321", "T038322", "T038323", "T002207", "444803", "T027843", "398363" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-8184" }, { "cve": "CVE-2024-9823", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Eclipse Jetty. Dieser Fehler betrifft den DoSFilter aufgrund einer unsachgem\u00e4\u00dfen internen Anforderungsverfolgung, die eine Auslastung des Speichers erm\u00f6glicht. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, indem er manipulierte Anfragen sendet." } ], "product_status": { "known_affected": [ "T002207", "67646", "444803", "T027843", "T038324", "T038325", "398363", "T038322", "T038323" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-9823" } ] }
fkie_cve-2024-9823
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally." }, { "lang": "es", "value": "Existe una vulnerabilidad de seguridad en el DosFilter de Jetty que puede ser explotada por usuarios no autorizados para provocar un ataque de denegaci\u00f3n de servicio (DoS) remoto en el servidor mediante el DosFilter. Al enviar repetidamente solicitudes manipuladas, los atacantes pueden generar errores OutofMemory y agotar la memoria del servidor." } ], "id": "CVE-2024-9823", "lastModified": "2024-10-15T12:57:46.880", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "emo@eclipse.org", "type": "Secondary" } ] }, "published": "2024-10-14T15:15:14.560", "references": [ { "source": "emo@eclipse.org", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "source": "emo@eclipse.org", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "source": "emo@eclipse.org", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "sourceIdentifier": "emo@eclipse.org", "vulnStatus": "Undergoing Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "emo@eclipse.org", "type": "Secondary" } ] }
rhsa-2024_9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-01-06T18:07:18+00:00", "generator": { "date": "2025-01-06T18:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-06T18:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
RHSA-2024:9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-02-18T14:27:42+00:00", "generator": { "date": "2025-02-18T14:27:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-18T14:27:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
rhsa-2024:9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-02-18T14:27:42+00:00", "generator": { "date": "2025-02-18T14:27:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.1" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-18T14:27:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
ghsa-j26w-f9rq-mr2q
Vulnerability from github
Description There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally.
Vulnerability details The Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web applications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It helps to mitigate excessive resource consumption by limiting the rate at which clients can make requests to the server. The DoSFilter monitors and tracks client request patterns, including request rates, and can take actions such as blocking or delaying requests from clients that exceed predefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory condition.
Impact Users of the DoSFilter may be subject to DoS attacks that will ultimately exhaust the memory of the server if they have not configured session passivation or an aggressive session inactivation timeout.
Patches The DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.
Patched releases:
- 9.4.54
- 10.0.18
- 11.0.18
- 12.0.3
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee10:jetty-ee10-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee8:jetty-ee8-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee9:jetty-ee9-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "9.0.0" }, { "fixed": "9.4.54" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "10.0.0" }, { "fixed": "10.0.18" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "11.0.0" }, { "fixed": "11.0.18" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-9823" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2024-10-14T21:14:31Z", "nvd_published_at": "2024-10-14T15:15:14Z", "severity": "MODERATE" }, "details": "Description\nThere exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\n\n\nVulnerability details\nThe Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web applications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It helps to mitigate excessive resource consumption by limiting the rate at which clients can make requests to the server. The DoSFilter monitors and tracks client request patterns, including request rates, and can take actions such as blocking or delaying requests from clients that exceed predefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory condition.\n\n\nImpact\nUsers of the DoSFilter may be subject to DoS attacks that will ultimately exhaust the memory of the server if they have not configured session passivation or an aggressive session inactivation timeout.\n\n\nPatches\nThe DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.\n\n\nPatched releases:\n\n * 9.4.54\n * 10.0.18\n * 11.0.18\n * 12.0.3", "id": "GHSA-j26w-f9rq-mr2q", "modified": "2024-10-14T21:14:31Z", "published": "2024-10-14T15:30:46Z", "references": [ { "type": "WEB", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "type": "WEB", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "type": "PACKAGE", "url": "https://github.com/jetty/jetty.project" }, { "type": "WEB", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "Eclipse Jetty has a denial of service vulnerability on DosFilter" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.