Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-9823 (GCVE-0-2024-9823)
Vulnerability from cvelistv5
- CWE-400 - Uncontrolled Resource Consumption
▼ | URL | Tags | |
---|---|---|---|
emo@eclipse.org | https://github.com/jetty/jetty.project/issues/1256 | Issue Tracking | |
emo@eclipse.org | https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h | Vendor Advisory | |
emo@eclipse.org | https://gitlab.eclipse.org/security/cve-assignement/-/issues/39 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250306-0006/ | Third Party Advisory |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Eclipse Foundation | Jetty |
Version: 9.0.0 Version: 10.0.0 Version: 11.0.0 ≤ |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "jetty", "vendor": "eclipse", "versions": [ { "lessThan": "9.4.54", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.0.18", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.0.18", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9823", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:46:11.062398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:49:38.804Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-03-07T00:10:47.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250306-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-servlets" ], "packageName": "org.eclipse.jetty:jetty-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Foundation", "versions": [ { "lessThan": "9.4.54", "status": "affected", "version": "9.0.0", "versionType": "semvar" }, { "lessThan": "10.0.18", "status": "affected", "version": "10.0.0", "versionType": "semvar" }, { "lessThan": "11.0.18", "status": "affected", "version": "11.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee8-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee8-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semvar" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee9-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee9-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://repo.maven.apache.org/maven2/", "defaultStatus": "unaffected", "modules": [ "jetty-ee10-servlets" ], "packageName": "org.eclipse.jetty.ee8:jetty-ee10-servlets", "product": "Jetty", "repo": "https://github.com/jetty/jetty.project", "vendor": "Eclipse Jetty", "versions": [ { "lessThan": "12.0.3", "status": "affected", "version": "12.0.0", "versionType": "semvar" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Lian Kee" } ], "datePublic": "2024-10-14T15:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\u003cbr\u003e" } ], "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T15:29:14.390Z", "orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "shortName": "eclipse" }, "references": [ { "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" }, { "url": "https://github.com/jetty/jetty.project/issues/1256" } ], "source": { "discovery": "UNKNOWN" }, "title": "Jetty DOS vulnerability on DosFilter", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The \u003ccode\u003eDoSFilter\u003c/code\u003e can be configured to not use sessions for tracking usage by setting the \u003ccode\u003etrackSessions\u003c/code\u003e init parameter to \u003ccode\u003efalse\u003c/code\u003e. This will then use only the IP tracking mechanism, which is not vulnerable.\u003cbr\u003e\nSessions can also be configured to have aggressive passivation or inactivation limits.\u003cbr\u003e" } ], "value": "The DoSFilter can be configured to not use sessions for tracking usage by setting the trackSessions init parameter to false. This will then use only the IP tracking mechanism, which is not vulnerable.\n\nSessions can also be configured to have aggressive passivation or inactivation limits." } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c", "assignerShortName": "eclipse", "cveId": "CVE-2024-9823", "datePublished": "2024-10-14T15:03:02.293Z", "dateReserved": "2024-10-10T15:56:32.744Z", "dateUpdated": "2025-03-07T00:10:47.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-9823\",\"sourceIdentifier\":\"emo@eclipse.org\",\"published\":\"2024-10-14T15:15:14.560\",\"lastModified\":\"2025-07-30T19:51:05.457\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de seguridad en el DosFilter de Jetty que puede ser explotada por usuarios no autorizados para provocar un ataque de denegaci\u00f3n de servicio (DoS) remoto en el servidor mediante el DosFilter. Al enviar repetidamente solicitudes manipuladas, los atacantes pueden generar errores OutofMemory y agotar la memoria del servidor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.4.54\",\"matchCriteriaId\":\"B3BEC443-EDBA-43A2-9CE0-7B87B4D6C1F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.0.18\",\"matchCriteriaId\":\"464A4A99-38E9-4ECD-AD6E-309AABC2F016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.18\",\"matchCriteriaId\":\"823119A8-D743-4EFB-A35A-2821C5960139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.0.3\",\"matchCriteriaId\":\"7B6AB855-8512-4C72-BB44-5DD2ED3E9A65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"F3E0B672-3E06-4422-B2A4-0BD073AEC2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"}]}]}],\"references\":[{\"url\":\"https://github.com/jetty/jetty.project/issues/1256\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gitlab.eclipse.org/security/cve-assignement/-/issues/39\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250306-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250306-0006/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-03-07T00:10:47.285Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-9823\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T17:46:11.062398Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\"], \"vendor\": \"eclipse\", \"product\": \"jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"lessThan\": \"9.4.54\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.18\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"11.0.0\", \"lessThan\": \"11.0.18\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-15T17:49:30.657Z\"}}], \"cna\": {\"title\": \"Jetty DOS vulnerability on DosFilter\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Lian Kee\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Foundation\", \"modules\": [\"jetty-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"lessThan\": \"9.4.54\", \"versionType\": \"semvar\"}, {\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.18\", \"versionType\": \"semvar\"}, {\"status\": \"affected\", \"version\": \"11.0.0\", \"lessThan\": \"11.0.18\", \"versionType\": \"semver\"}], \"packageName\": \"org.eclipse.jetty:jetty-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee8-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semvar\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee8-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee9-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semver\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee9-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://github.com/jetty/jetty.project\", \"vendor\": \"Eclipse Jetty\", \"modules\": [\"jetty-ee10-servlets\"], \"product\": \"Jetty\", \"versions\": [{\"status\": \"affected\", \"version\": \"12.0.0\", \"lessThan\": \"12.0.3\", \"versionType\": \"semvar\"}], \"packageName\": \"org.eclipse.jetty.ee8:jetty-ee10-servlets\", \"collectionURL\": \"https://repo.maven.apache.org/maven2/\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-10-14T15:00:00.000Z\", \"references\": [{\"url\": \"https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h\"}, {\"url\": \"https://gitlab.eclipse.org/security/cve-assignement/-/issues/39\"}, {\"url\": \"https://github.com/jetty/jetty.project/issues/1256\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"The DoSFilter can be configured to not use sessions for tracking usage by setting the trackSessions init parameter to false. This will then use only the IP tracking mechanism, which is not vulnerable.\\n\\nSessions can also be configured to have aggressive passivation or inactivation limits.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The \u003ccode\u003eDoSFilter\u003c/code\u003e can be configured to not use sessions for tracking usage by setting the \u003ccode\u003etrackSessions\u003c/code\u003e init parameter to \u003ccode\u003efalse\u003c/code\u003e. This will then use only the IP tracking mechanism, which is not vulnerable.\u003cbr\u003e\\nSessions can also be configured to have aggressive passivation or inactivation limits.\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"shortName\": \"eclipse\", \"dateUpdated\": \"2024-10-14T15:29:14.390Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-9823\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-07T00:10:47.285Z\", \"dateReserved\": \"2024-10-10T15:56:32.744Z\", \"assignerOrgId\": \"e51fbebd-6053-4e49-959f-1b94eeb69a2c\", \"datePublished\": \"2024-10-14T15:03:02.293Z\", \"assignerShortName\": \"eclipse\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2024_9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-01-06T18:07:18+00:00", "generator": { "date": "2025-01-06T18:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.5" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-06T18:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
RHSA-2024:9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-09-26T06:19:02+00:00", "generator": { "date": "2025-09-26T06:19:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T06:19:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
rhsa-2024:9571
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Streams for Apache Kafka 2.8.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Streams for Apache Kafka, based on the Apache Kafka project, offers a distributed\nbackbone that allows microservices and other applications to share data with\nextremely high throughput and extremely low latency.\n\nThis release of Red Hat AMQ Streams 2.8.0 serves as a replacement for Red Hat\nAMQ Streams 2.7.0, and includes security and bug fixes, and enhancements.\n\nSecurity Fix(es):\n* Zookeeper, Kafka, Cruise Control: org.eclipse.jetty/jetty-server: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks [amq-st-2] \n\"(CVE-2024-8184)\"\n\n* Zookeeper, Kafka : org.eclipse.jetty/jetty-servlets: Jetty DOS vulnerability on DosFilter [amq-st-2] \"(CVE-2024-9823)\"\n\n* Zookeeper, Kafka, Drain Cleaner, Cruise Control: Apache Commons IO: Possible denial of service attack on untrusted input to XmlStreamReader \"(CVE-2024-47554)\"\n\n* Kafka: (com.google.protobuf:protobuf-java@3.23.4). Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users \"(CVE-2024-7254)\"\n\n\"Drain Cleaner: Awaiting Analysis(CVE-2024-29025)\"\n\n* Kroxylicoius: When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. \"(CVE-2024-8285)\"", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9571", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "ASUI-91", "url": "https://issues.redhat.com/browse/ASUI-91" }, { "category": "external", "summary": "ENTMQST-2632", "url": "https://issues.redhat.com/browse/ENTMQST-2632" }, { "category": "external", "summary": "ENTMQST-3288", "url": "https://issues.redhat.com/browse/ENTMQST-3288" }, { "category": "external", "summary": "ENTMQST-4019", "url": "https://issues.redhat.com/browse/ENTMQST-4019" }, { "category": "external", "summary": "ENTMQST-5199", "url": "https://issues.redhat.com/browse/ENTMQST-5199" }, { "category": "external", "summary": "ENTMQST-5669", "url": "https://issues.redhat.com/browse/ENTMQST-5669" }, { "category": "external", "summary": "ENTMQST-5674", "url": "https://issues.redhat.com/browse/ENTMQST-5674" }, { "category": "external", "summary": "ENTMQST-5740", "url": "https://issues.redhat.com/browse/ENTMQST-5740" }, { "category": "external", "summary": "ENTMQST-5789", "url": "https://issues.redhat.com/browse/ENTMQST-5789" }, { "category": "external", "summary": "ENTMQST-5843", "url": "https://issues.redhat.com/browse/ENTMQST-5843" }, { "category": "external", "summary": "ENTMQST-5850", "url": "https://issues.redhat.com/browse/ENTMQST-5850" }, { "category": "external", "summary": "ENTMQST-5863", "url": "https://issues.redhat.com/browse/ENTMQST-5863" }, { "category": "external", "summary": "ENTMQST-5865", "url": "https://issues.redhat.com/browse/ENTMQST-5865" }, { "category": "external", "summary": "ENTMQST-5915", "url": "https://issues.redhat.com/browse/ENTMQST-5915" }, { "category": "external", "summary": "ENTMQST-6028", "url": "https://issues.redhat.com/browse/ENTMQST-6028" }, { "category": "external", "summary": "ENTMQST-6032", "url": "https://issues.redhat.com/browse/ENTMQST-6032" }, { "category": "external", "summary": "ENTMQST-6129", "url": "https://issues.redhat.com/browse/ENTMQST-6129" }, { "category": "external", "summary": "ENTMQST-6183", "url": "https://issues.redhat.com/browse/ENTMQST-6183" }, { "category": "external", "summary": "ENTMQST-6205", "url": "https://issues.redhat.com/browse/ENTMQST-6205" }, { "category": "external", "summary": "ENTMQST-6225", "url": "https://issues.redhat.com/browse/ENTMQST-6225" }, { "category": "external", "summary": "ENTMQST-6341", "url": "https://issues.redhat.com/browse/ENTMQST-6341" }, { "category": "external", "summary": "ENTMQST-6421", "url": "https://issues.redhat.com/browse/ENTMQST-6421" }, { "category": "external", "summary": "ENTMQST-6422", "url": "https://issues.redhat.com/browse/ENTMQST-6422" }, { "category": "external", "summary": "ENTMQSTPR-43", "url": "https://issues.redhat.com/browse/ENTMQSTPR-43" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9571.json" } ], "title": "Red Hat Security Advisory: Streams for Apache Kafka 2.8.0 release and security update", "tracking": { "current_release_date": "2025-09-26T06:19:02+00:00", "generator": { "date": "2025-09-26T06:19:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2024:9571", "initial_release_date": "2024-11-13T16:21:03+00:00", "revision_history": [ { "date": "2024-11-13T16:21:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T16:21:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T06:19:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Streams for Apache Kafka 2.8.0", "product": { "name": "Streams for Apache Kafka 2.8.0", "product_id": "Streams for Apache Kafka 2.8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_streams:2" } } } ], "category": "product_family", "name": "Streams for Apache Kafka" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-09-19T01:20:29.981665+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2313454" } ], "notes": [ { "category": "description", "text": "A flaw was found in Protocol Buffers (protobuf). This issue can allows an attacker to cause a StackOverflow via parsing untrusted Protocol Buffers data containing arbitrarily nested SGROUP tags, leading to unbounded recursion.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf: StackOverflow vulnerability in Protocol Buffers", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue represents a significant severity risk because unbounded recursion in Protocol Buffers parsing can be exploited to trigger stack overflows, leading to Denial of Service (DoS). When parsers, such as `DiscardUnknownFieldsParser` or the Java Protobuf Lite parser, encounter arbitrarily nested groups or deeply recursive map fields, the lack of recursion depth limits can result in uncontrolled stack growth. Attackers can craft malicious protobuf messages that deliberately exceed the stack\u0027s capacity, causing the application to crash or become unresponsive.\n\nThe protobuf package as shipped in RHEL does not include the affected java or kotlin bindings, therefore RHEL is Not Affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-7254" }, { "category": "external", "summary": "RHBZ#2313454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313454" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7254" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa", "url": "https://github.com/protocolbuffers/protobuf/commit/cc8b3483a5584b3301e3d43d17eb59704857ffaa" } ], "release_date": "2024-09-19T01:15:10.963000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "protobuf: StackOverflow vulnerability in Protocol Buffers" }, { "cve": "CVE-2024-8184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:01.239238+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty\u0027s ThreadLimitHandler.getRemote(). This flaw allows unauthorized users to cause remote denial of service (DoS) attacks. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as moderate rather than important because it requires specific conditions to be met, including continuous, crafted requests that deliberately target memory allocation to exhaust resources. While it can cause a denial of service, it does not lead to direct compromise of sensitive data, unauthorized access, or code execution.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8184" }, { "category": "external", "summary": "RHBZ#2318564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8184", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8184" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/pull/11723", "url": "https://github.com/jetty/jetty.project/pull/11723" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-g8m5-722r-8whq" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/30" } ], "release_date": "2024-10-14T15:09:37.861000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks" }, { "cve": "CVE-2024-8285", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2024-08-29T22:39:10.882000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Kroxylicious. When establishing the connection with the upstream Kafka server using a TLS secured connection, Kroxylicious fails to properly verify the server\u0027s hostname, resulting in an insecure connection. For a successful attack to be performed, the attacker needs to perform a Man-in-the-Middle attack or compromise any external systems, such as DNS or network routing configuration. This issue is considered a high complexity attack, with additional high privileges required, as the attack would need access to the Kroxylicious configuration or a peer system. The result of a successful attack impacts both data integrity and confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kroxylicious: Missing upstream Kafka TLS hostname verification", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat have considered this vulnerability as a \u0027Moderate\u0027 severity given the complexity and the permission level required to perform a successful attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8285" }, { "category": "external", "summary": "RHBZ#2308606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8285" } ], "release_date": "2024-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kroxylicious: Missing upstream Kafka TLS hostname verification" }, { "cve": "CVE-2024-9823", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-14T16:01:06.545771+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2318565" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jetty. The DosFilter can be exploited remotely by unauthorized users to trigger an out-of-memory condition by repeatedly sending specially crafted requests. This issue may cause a crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-9823" }, { "category": "external", "summary": "RHBZ#2318565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9823", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/issues/1256", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "category": "external", "summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "category": "external", "summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" } ], "release_date": "2024-10-14T15:03:02.293000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2272907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the io.netty:netty-codec-http package. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling issues due to the accumulation of data in the HttpPostRequestDecoder. The decoder cumulates bytes in the undecodedChunk buffer until it can decode a field, allowing data to accumulate without limits. This flaw allows an attacker to cause a denial of service by sending a chunked post consisting of many small fields that will be accumulated in the bodyListHttpData list.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec-http: Allocation of Resources Without Limits or Throttling", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in io.netty:netty-codec-http, allowing for Allocation of Resources Without Limits or Throttling issues, is assessed as moderate severity due to its potential impact on system availability and performance. By exploiting the flaw in HttpPostRequestDecoder, an attacker can craft chunked POST requests with numerous small fields, causing excessive accumulation of data in memory buffers. This unrestricted accumulation can lead to significant memory consumption on the server, potentially exhausting available resources and resulting in denial of service (DoS) conditions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-29025" }, { "category": "external", "summary": "RHBZ#2272907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-29025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3", "url": "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" }, { "category": "external", "summary": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", "url": "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", "url": "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812", "url": "https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-6483812" } ], "release_date": "2024-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Streams for Apache Kafka 2.8.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty-codec-http: Allocation of Resources Without Limits or Throttling" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-10-03T12:00:40.921058+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316271" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Apache Commons IO component in the org.apache.commons.io.input.XmlStreamReader class. Excessive CPU resource consumption can lead to a denial of service when an untrusted input is processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Streams for Apache Kafka 2.8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47554" }, { "category": "external", "summary": "RHBZ#2316271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47554", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47554" }, { "category": "external", "summary": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1", "url": "https://lists.apache.org/thread/6ozr91rr9cj5lm0zyhv30bsp317hk5z1" } ], "release_date": "2024-10-03T11:32:48.936000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T16:21:03+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Streams for Apache Kafka 2.8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9571" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Streams for Apache Kafka 2.8.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader" } ] }
ghsa-j26w-f9rq-mr2q
Vulnerability from github
Description There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally.
Vulnerability details The Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web applications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It helps to mitigate excessive resource consumption by limiting the rate at which clients can make requests to the server. The DoSFilter monitors and tracks client request patterns, including request rates, and can take actions such as blocking or delaying requests from clients that exceed predefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory condition.
Impact Users of the DoSFilter may be subject to DoS attacks that will ultimately exhaust the memory of the server if they have not configured session passivation or an aggressive session inactivation timeout.
Patches The DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.
Patched releases:
- 9.4.54
- 10.0.18
- 11.0.18
- 12.0.3
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee10:jetty-ee10-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee8:jetty-ee8-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty.ee9:jetty-ee9-servlets" }, "ranges": [ { "events": [ { "introduced": "12.0.0" }, { "fixed": "12.0.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "9.0.0" }, { "fixed": "9.4.54" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "10.0.0" }, { "fixed": "10.0.18" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.eclipse.jetty:jetty-servlets" }, "ranges": [ { "events": [ { "introduced": "11.0.0" }, { "fixed": "11.0.18" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-9823" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2024-10-14T21:14:31Z", "nvd_published_at": "2024-10-14T15:15:14Z", "severity": "MODERATE" }, "details": "Description\nThere exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally.\n\n\nVulnerability details\nThe Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web applications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It helps to mitigate excessive resource consumption by limiting the rate at which clients can make requests to the server. The DoSFilter monitors and tracks client request patterns, including request rates, and can take actions such as blocking or delaying requests from clients that exceed predefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory condition.\n\n\nImpact\nUsers of the DoSFilter may be subject to DoS attacks that will ultimately exhaust the memory of the server if they have not configured session passivation or an aggressive session inactivation timeout.\n\n\nPatches\nThe DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured.\n\n\nPatched releases:\n\n * 9.4.54\n * 10.0.18\n * 11.0.18\n * 12.0.3", "id": "GHSA-j26w-f9rq-mr2q", "modified": "2025-03-07T13:49:36Z", "published": "2024-10-14T15:30:46Z", "references": [ { "type": "WEB", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9823" }, { "type": "WEB", "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "type": "PACKAGE", "url": "https://github.com/jetty/jetty.project" }, { "type": "WEB", "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250306-0006" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "Eclipse Jetty has a denial of service vulnerability on DosFilter" }
WID-SEC-W-2024-3176
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Eclipse Jetty ist ein Java-HTTP-Server und Java-Servlet-Container.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Eclipse Jetty ausnutzen, um einen Denial of Service Angriff zu erzeugen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3176 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3176.json" }, { "category": "self", "summary": "WID-SEC-2024-3176 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3176" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00193.html" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00194.html" }, { "category": "external", "summary": "GitHub Advisory vom 2024-10-14", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3720-1 vom 2024-10-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O3QVMQNMY7KSISCQZHRID4KVIGDCRX47/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14408-1 vom 2024-10-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BNU3R7DW4USCKK4UHDLFZ57HXWYZNOCE/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "IBM Security Bulletin 7176904 vom 2024-12-06", "url": "https://www.ibm.com/support/pages/node/7176904" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11023 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:11023" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2702 vom 2024-12-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2702.html" }, { "category": "external", "summary": "IBM Security Bulletin 7183584 vom 2025-02-18", "url": "https://www.ibm.com/support/pages/node/7183584" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2416 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2416" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250306-0006 vom 2025-03-06", "url": "https://security.netapp.com/advisory/ntap-20250306-0006/" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250306-0005 vom 2025-03-06", "url": "https://security.netapp.com/advisory/ntap-20250306-0005/" }, { "category": "external", "summary": "IBM Security Bulletin 7229444 vom 2025-03-28", "url": "https://www.ibm.com/support/pages/node/7229444" }, { "category": "external", "summary": "Debian Security Advisory DLA-4106 vom 2025-04-02", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00001.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5894 vom 2025-04-05", "url": "https://lists.debian.org/debian-security-announce/2025/msg00056.html" }, { "category": "external", "summary": "IBM Security Bulletin 7231640 vom 2025-04-23", "url": "https://www.ibm.com/support/pages/node/7231640" }, { "category": "external", "summary": "IBM Security Bulletin 7232032 vom 2025-04-29", "url": "https://www.ibm.com/support/pages/node/7232032" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7234827" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15160-1 vom 2025-05-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHGGC7B6PWN2UBH367C4SXP6PWNDYAXM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01738-1 vom 2025-05-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4ULIFKC3HN46CWW5I3UU5DGUJKMLM6UC/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9922 vom 2025-06-30", "url": "https://access.redhat.com/errata/RHSA-2025:9922" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12511 vom 2025-08-03", "url": "https://access.redhat.com/errata/RHSA-2025:12511" }, { "category": "external", "summary": "IBM Security Bulletin 7241577 vom 2025-08-06", "url": "https://www.ibm.com/support/pages/node/7241577" }, { "category": "external", "summary": "IBM Security Bulletin 7243781 vom 2025-09-02", "url": "https://www.ibm.com/support/pages/node/7243781" } ], "source_lang": "en-US", "title": "Eclipse Jetty: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:13.471+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3176", "initial_release_date": "2024-10-14T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM und openSUSE aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "21" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.0.9", "product": { "name": "Eclipse Jetty \u003c12.0.9", "product_id": "T038318" } }, { "category": "product_version", "name": "12.0.9", "product": { "name": "Eclipse Jetty 12.0.9", "product_id": "T038318-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.9" } } }, { "category": "product_version_range", "name": "\u003c10.0.24", "product": { "name": "Eclipse Jetty \u003c10.0.24", "product_id": "T038319" } }, { "category": "product_version", "name": "10.0.24", "product": { "name": "Eclipse Jetty 10.0.24", "product_id": "T038319-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.24" } } }, { "category": "product_version_range", "name": "\u003c11.0.24", "product": { "name": "Eclipse Jetty \u003c11.0.24", "product_id": "T038320" } }, { "category": "product_version", "name": "11.0.24", "product": { "name": "Eclipse Jetty 11.0.24", "product_id": "T038320-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.24" } } }, { "category": "product_version_range", "name": "\u003c9.4.56", "product": { "name": "Eclipse Jetty \u003c9.4.56", "product_id": "T038321" } }, { "category": "product_version", "name": "9.4.56", "product": { "name": "Eclipse Jetty 9.4.56", "product_id": "T038321-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.56" } } }, { "category": "product_version_range", "name": "\u003c12.0.3", "product": { "name": "Eclipse Jetty \u003c12.0.3", "product_id": "T038322" } }, { "category": "product_version", "name": "12.0.3", "product": { "name": "Eclipse Jetty 12.0.3", "product_id": "T038322-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.3" } } }, { "category": "product_version_range", "name": "\u003c9.4.54", "product": { "name": "Eclipse Jetty \u003c9.4.54", "product_id": "T038323" } }, { "category": "product_version", "name": "9.4.54", "product": { "name": "Eclipse Jetty 9.4.54", "product_id": "T038323-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.54" } } }, { "category": "product_version_range", "name": "\u003c10.0.18", "product": { "name": "Eclipse Jetty \u003c10.0.18", "product_id": "T038324" } }, { "category": "product_version", "name": "10.0.18", "product": { "name": "Eclipse Jetty 10.0.18", "product_id": "T038324-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.18" } } }, { "category": "product_version_range", "name": "\u003c11.0.18", "product": { "name": "Eclipse Jetty \u003c11.0.18", "product_id": "T038325" } }, { "category": "product_version", "name": "11.0.18", "product": { "name": "Eclipse Jetty 11.0.18", "product_id": "T038325-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.18" } } }, { "category": "product_version_range", "name": "\u003c12.0.4", "product": { "name": "Eclipse Jetty \u003c12.0.4", "product_id": "T038326" } }, { "category": "product_version", "name": "12.0.4", "product": { "name": "Eclipse Jetty 12.0.4", "product_id": "T038326-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.4" } } }, { "category": "product_version_range", "name": "\u003c12.0.12", "product": { "name": "Eclipse Jetty \u003c12.0.12", "product_id": "T038327" } }, { "category": "product_version", "name": "12.0.12", "product": { "name": "Eclipse Jetty 12.0.12", "product_id": "T038327-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.12" } } } ], "category": "product_name", "name": "Jetty" } ], "category": "vendor", "name": "Eclipse" }, { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version", "name": "1.4-1.10.1.0", "product": { "name": "IBM Installation Manager 1.4-1.10.1.0", "product_id": "T043115", "product_identification_helper": { "cpe": "cpe:/a:ibm:installation_manager:1.4_-_1.10.1.0" } } } ], "category": "product_name", "name": "Installation Manager" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.11.0.1 Interim fix 042", "product": { "name": "IBM Operational Decision Manager \u003cV8.11.0.1 Interim fix 042", "product_id": "T043174" } }, { "category": "product_version", "name": "V8.11.0.1 Interim fix 042", "product": { "name": "IBM Operational Decision Manager V8.11.0.1 Interim fix 042", "product_id": "T043174-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.11.0.1_interim_fix_042" } } }, { "category": "product_version_range", "name": "\u003cV8.11.1.0: Interim fix 039", "product": { "name": "IBM Operational Decision Manager \u003cV8.11.1.0: Interim fix 039", "product_id": "T043175" } }, { "category": "product_version", "name": "V8.11.1.0: Interim fix 039", "product": { "name": "IBM Operational Decision Manager V8.11.1.0: Interim fix 039", "product_id": "T043175-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.11.1.0_interim_fix_039" } } }, { "category": "product_version_range", "name": "\u003cV8.12.0.1: Interim fix 024", "product": { "name": "IBM Operational Decision Manager \u003cV8.12.0.1: Interim fix 024", "product_id": "T043176" } }, { "category": "product_version", "name": "V8.12.0.1: Interim fix 024", "product": { "name": "IBM Operational Decision Manager V8.12.0.1: Interim fix 024", "product_id": "T043176-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.12.0.1_interim_fix_024" } } }, { "category": "product_version_range", "name": "\u003cV9.0.0.1: Interim fix 007", "product": { "name": "IBM Operational Decision Manager \u003cV9.0.0.1: Interim fix 007", "product_id": "T043177" } }, { "category": "product_version", "name": "V9.0.0.1: Interim fix 007", "product": { "name": "IBM Operational Decision Manager V9.0.0.1: Interim fix 007", "product_id": "T043177-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v9.0.0.1_interim_fix_007" } } } ], "category": "product_name", "name": "Operational Decision Manager" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF01", "product_id": "T041270" } }, { "category": "product_version", "name": "7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF01", "product_id": "T041270-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "Collaboration and Deployment Services 8.5", "product": { "name": "IBM SPSS Collaboration and Deployment Services 8.5", "product_id": "T038750", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:collaboration_and_deployment_services_8.5" } } } ], "category": "product_name", "name": "SPSS" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12", "product_id": "T043916", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:sqlguard_12.0p35_bundle_jan-28-2025" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "IP Edition \u003c4.2 Fix Pack 23", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c4.2 Fix Pack 23", "product_id": "T046654" } }, { "category": "product_version", "name": "IP Edition 4.2 Fix Pack 23", "product": { "name": "IBM Tivoli Network Manager IP Edition 4.2 Fix Pack 23", "product_id": "T046654-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition___4.2_fix_pack_23" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for Linux", "product": { "name": "NetApp ActiveIQ Unified Manager for Linux", "product_id": "T023548", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_linux" } } }, { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Streams 2", "product": { "name": "Red Hat JBoss A-MQ Streams 2", "product_id": "T041596", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:streams_2" } } } ], "category": "product_name", "name": "JBoss A-MQ" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6762", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T038326", "T043916", "T038750", "T038322", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6762" }, { "cve": "CVE-2024-6763", "product_status": { "known_affected": [ "T025152", "67646", "T038318", "T038326", "T043916", "T038327", "T038750", "T038322", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2024-8184", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T038326", "T043916", "T038320", "T038321", "T038322", "T038323", "T025631", "398363", "T046654", "T038318", "T038319", "T038750", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T027843", "T043174", "T043175", "T043176", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-8184" }, { "cve": "CVE-2024-9823", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T043916", "T038750", "T038322", "T038323", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-9823" } ] }
wid-sec-w-2024-3176
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Eclipse Jetty ist ein Java-HTTP-Server und Java-Servlet-Container.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Eclipse Jetty ausnutzen, um einen Denial of Service Angriff zu erzeugen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3176 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3176.json" }, { "category": "self", "summary": "WID-SEC-2024-3176 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3176" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00193.html" }, { "category": "external", "summary": "Jetty Advisory vom 2024-10-14", "url": "https://www.eclipse.org//lists/jetty-announce/msg00194.html" }, { "category": "external", "summary": "GitHub Advisory vom 2024-10-14", "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-qh8g-58pp-2wxh" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3720-1 vom 2024-10-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O3QVMQNMY7KSISCQZHRID4KVIGDCRX47/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14408-1 vom 2024-10-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BNU3R7DW4USCKK4UHDLFZ57HXWYZNOCE/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9571 vom 2024-11-13", "url": "https://access.redhat.com/errata/RHSA-2024:9571" }, { "category": "external", "summary": "IBM Security Bulletin 7176904 vom 2024-12-06", "url": "https://www.ibm.com/support/pages/node/7176904" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:11023 vom 2024-12-12", "url": "https://access.redhat.com/errata/RHSA-2024:11023" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2702 vom 2024-12-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2702.html" }, { "category": "external", "summary": "IBM Security Bulletin 7183584 vom 2025-02-18", "url": "https://www.ibm.com/support/pages/node/7183584" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2416 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:2416" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250306-0006 vom 2025-03-06", "url": "https://security.netapp.com/advisory/ntap-20250306-0006/" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20250306-0005 vom 2025-03-06", "url": "https://security.netapp.com/advisory/ntap-20250306-0005/" }, { "category": "external", "summary": "IBM Security Bulletin 7229444 vom 2025-03-28", "url": "https://www.ibm.com/support/pages/node/7229444" }, { "category": "external", "summary": "Debian Security Advisory DLA-4106 vom 2025-04-02", "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00001.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5894 vom 2025-04-05", "url": "https://lists.debian.org/debian-security-announce/2025/msg00056.html" }, { "category": "external", "summary": "IBM Security Bulletin 7231640 vom 2025-04-23", "url": "https://www.ibm.com/support/pages/node/7231640" }, { "category": "external", "summary": "IBM Security Bulletin 7232032 vom 2025-04-29", "url": "https://www.ibm.com/support/pages/node/7232032" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7234827" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15160-1 vom 2025-05-27", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHGGC7B6PWN2UBH367C4SXP6PWNDYAXM/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01738-1 vom 2025-05-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4ULIFKC3HN46CWW5I3UU5DGUJKMLM6UC/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9922 vom 2025-06-30", "url": "https://access.redhat.com/errata/RHSA-2025:9922" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:12511 vom 2025-08-03", "url": "https://access.redhat.com/errata/RHSA-2025:12511" }, { "category": "external", "summary": "IBM Security Bulletin 7241577 vom 2025-08-06", "url": "https://www.ibm.com/support/pages/node/7241577" }, { "category": "external", "summary": "IBM Security Bulletin 7243781 vom 2025-09-02", "url": "https://www.ibm.com/support/pages/node/7243781" } ], "source_lang": "en-US", "title": "Eclipse Jetty: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-02T22:00:00.000+00:00", "generator": { "date": "2025-09-03T07:32:13.471+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3176", "initial_release_date": "2024-10-14T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-05T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-06T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2025-03-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-01T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-06T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-23T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-27T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM und openSUSE aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-08-06T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "21" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c12.0.9", "product": { "name": "Eclipse Jetty \u003c12.0.9", "product_id": "T038318" } }, { "category": "product_version", "name": "12.0.9", "product": { "name": "Eclipse Jetty 12.0.9", "product_id": "T038318-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.9" } } }, { "category": "product_version_range", "name": "\u003c10.0.24", "product": { "name": "Eclipse Jetty \u003c10.0.24", "product_id": "T038319" } }, { "category": "product_version", "name": "10.0.24", "product": { "name": "Eclipse Jetty 10.0.24", "product_id": "T038319-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.24" } } }, { "category": "product_version_range", "name": "\u003c11.0.24", "product": { "name": "Eclipse Jetty \u003c11.0.24", "product_id": "T038320" } }, { "category": "product_version", "name": "11.0.24", "product": { "name": "Eclipse Jetty 11.0.24", "product_id": "T038320-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.24" } } }, { "category": "product_version_range", "name": "\u003c9.4.56", "product": { "name": "Eclipse Jetty \u003c9.4.56", "product_id": "T038321" } }, { "category": "product_version", "name": "9.4.56", "product": { "name": "Eclipse Jetty 9.4.56", "product_id": "T038321-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.56" } } }, { "category": "product_version_range", "name": "\u003c12.0.3", "product": { "name": "Eclipse Jetty \u003c12.0.3", "product_id": "T038322" } }, { "category": "product_version", "name": "12.0.3", "product": { "name": "Eclipse Jetty 12.0.3", "product_id": "T038322-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.3" } } }, { "category": "product_version_range", "name": "\u003c9.4.54", "product": { "name": "Eclipse Jetty \u003c9.4.54", "product_id": "T038323" } }, { "category": "product_version", "name": "9.4.54", "product": { "name": "Eclipse Jetty 9.4.54", "product_id": "T038323-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:9.4.54" } } }, { "category": "product_version_range", "name": "\u003c10.0.18", "product": { "name": "Eclipse Jetty \u003c10.0.18", "product_id": "T038324" } }, { "category": "product_version", "name": "10.0.18", "product": { "name": "Eclipse Jetty 10.0.18", "product_id": "T038324-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:10.0.18" } } }, { "category": "product_version_range", "name": "\u003c11.0.18", "product": { "name": "Eclipse Jetty \u003c11.0.18", "product_id": "T038325" } }, { "category": "product_version", "name": "11.0.18", "product": { "name": "Eclipse Jetty 11.0.18", "product_id": "T038325-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:11.0.18" } } }, { "category": "product_version_range", "name": "\u003c12.0.4", "product": { "name": "Eclipse Jetty \u003c12.0.4", "product_id": "T038326" } }, { "category": "product_version", "name": "12.0.4", "product": { "name": "Eclipse Jetty 12.0.4", "product_id": "T038326-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.4" } } }, { "category": "product_version_range", "name": "\u003c12.0.12", "product": { "name": "Eclipse Jetty \u003c12.0.12", "product_id": "T038327" } }, { "category": "product_version", "name": "12.0.12", "product": { "name": "Eclipse Jetty 12.0.12", "product_id": "T038327-fixed", "product_identification_helper": { "cpe": "cpe:/a:eclipse:jetty:12.0.12" } } } ], "category": "product_name", "name": "Jetty" } ], "category": "vendor", "name": "Eclipse" }, { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version", "name": "1.4-1.10.1.0", "product": { "name": "IBM Installation Manager 1.4-1.10.1.0", "product_id": "T043115", "product_identification_helper": { "cpe": "cpe:/a:ibm:installation_manager:1.4_-_1.10.1.0" } } } ], "category": "product_name", "name": "Installation Manager" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV8.11.0.1 Interim fix 042", "product": { "name": "IBM Operational Decision Manager \u003cV8.11.0.1 Interim fix 042", "product_id": "T043174" } }, { "category": "product_version", "name": "V8.11.0.1 Interim fix 042", "product": { "name": "IBM Operational Decision Manager V8.11.0.1 Interim fix 042", "product_id": "T043174-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.11.0.1_interim_fix_042" } } }, { "category": "product_version_range", "name": "\u003cV8.11.1.0: Interim fix 039", "product": { "name": "IBM Operational Decision Manager \u003cV8.11.1.0: Interim fix 039", "product_id": "T043175" } }, { "category": "product_version", "name": "V8.11.1.0: Interim fix 039", "product": { "name": "IBM Operational Decision Manager V8.11.1.0: Interim fix 039", "product_id": "T043175-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.11.1.0_interim_fix_039" } } }, { "category": "product_version_range", "name": "\u003cV8.12.0.1: Interim fix 024", "product": { "name": "IBM Operational Decision Manager \u003cV8.12.0.1: Interim fix 024", "product_id": "T043176" } }, { "category": "product_version", "name": "V8.12.0.1: Interim fix 024", "product": { "name": "IBM Operational Decision Manager V8.12.0.1: Interim fix 024", "product_id": "T043176-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v8.12.0.1_interim_fix_024" } } }, { "category": "product_version_range", "name": "\u003cV9.0.0.1: Interim fix 007", "product": { "name": "IBM Operational Decision Manager \u003cV9.0.0.1: Interim fix 007", "product_id": "T043177" } }, { "category": "product_version", "name": "V9.0.0.1: Interim fix 007", "product": { "name": "IBM Operational Decision Manager V9.0.0.1: Interim fix 007", "product_id": "T043177-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:v9.0.0.1_interim_fix_007" } } } ], "category": "product_name", "name": "Operational Decision Manager" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF01", "product_id": "T041270" } }, { "category": "product_version", "name": "7.5.0 UP11 IF01", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF01", "product_id": "T041270-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if01" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "Collaboration and Deployment Services 8.5", "product": { "name": "IBM SPSS Collaboration and Deployment Services 8.5", "product_id": "T038750", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:collaboration_and_deployment_services_8.5" } } } ], "category": "product_name", "name": "SPSS" }, { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12", "product_id": "T043916", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:sqlguard_12.0p35_bundle_jan-28-2025" } } } ], "category": "product_name", "name": "Security Guardium" }, { "branches": [ { "category": "product_version_range", "name": "IP Edition \u003c4.2 Fix Pack 23", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c4.2 Fix Pack 23", "product_id": "T046654" } }, { "category": "product_version", "name": "IP Edition 4.2 Fix Pack 23", "product": { "name": "IBM Tivoli Network Manager IP Edition 4.2 Fix Pack 23", "product_id": "T046654-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition___4.2_fix_pack_23" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for Linux", "product": { "name": "NetApp ActiveIQ Unified Manager for Linux", "product_id": "T023548", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_linux" } } }, { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Streams 2", "product": { "name": "Red Hat JBoss A-MQ Streams 2", "product_id": "T041596", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:streams_2" } } } ], "category": "product_name", "name": "JBoss A-MQ" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-6762", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T038326", "T043916", "T038750", "T038322", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6762" }, { "cve": "CVE-2024-6763", "product_status": { "known_affected": [ "T025152", "67646", "T038318", "T038326", "T043916", "T038327", "T038750", "T038322", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-6763" }, { "cve": "CVE-2024-8184", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T038326", "T043916", "T038320", "T038321", "T038322", "T038323", "T025631", "398363", "T046654", "T038318", "T038319", "T038750", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T027843", "T043174", "T043175", "T043176", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-8184" }, { "cve": "CVE-2024-9823", "product_status": { "known_affected": [ "T025152", "67646", "T038324", "T038325", "T043916", "T038750", "T038322", "T038323", "T023548", "T043115", "2951", "T002207", "T041270", "444803", "T019704", "T025631", "T027843", "398363", "T043174", "T043175", "T043176", "T046654", "T041596", "T043177" ] }, "release_date": "2024-10-14T22:00:00.000+00:00", "title": "CVE-2024-9823" } ] }
fkie_cve-2024-9823
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
emo@eclipse.org | https://github.com/jetty/jetty.project/issues/1256 | Issue Tracking | |
emo@eclipse.org | https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h | Vendor Advisory | |
emo@eclipse.org | https://gitlab.eclipse.org/security/cve-assignement/-/issues/39 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250306-0006/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
eclipse | jetty | * | |
eclipse | jetty | * | |
eclipse | jetty | * | |
eclipse | jetty | * | |
netapp | bootstrap_os | - | |
netapp | hci_compute_node | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BEC443-EDBA-43A2-9CE0-7B87B4D6C1F3", "versionEndExcluding": "9.4.54", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "matchCriteriaId": "464A4A99-38E9-4ECD-AD6E-309AABC2F016", "versionEndExcluding": "10.0.18", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "matchCriteriaId": "823119A8-D743-4EFB-A35A-2821C5960139", "versionEndExcluding": "11.0.18", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B6AB855-8512-4C72-BB44-5DD2ED3E9A65", "versionEndExcluding": "12.0.3", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There exists a security vulnerability in Jetty\u0027s DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server\u0027s memory finally." }, { "lang": "es", "value": "Existe una vulnerabilidad de seguridad en el DosFilter de Jetty que puede ser explotada por usuarios no autorizados para provocar un ataque de denegaci\u00f3n de servicio (DoS) remoto en el servidor mediante el DosFilter. Al enviar repetidamente solicitudes manipuladas, los atacantes pueden generar errores OutofMemory y agotar la memoria del servidor." } ], "id": "CVE-2024-9823", "lastModified": "2025-07-30T19:51:05.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "emo@eclipse.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T15:15:14.560", "references": [ { "source": "emo@eclipse.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/jetty/jetty.project/issues/1256" }, { "source": "emo@eclipse.org", "tags": [ "Vendor Advisory" ], "url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-7hcf-ppf8-5w5h" }, { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250306-0006/" } ], "sourceIdentifier": "emo@eclipse.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "emo@eclipse.org", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.