A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2064226 | issue tracking vendor advisory |
https://access.redhat.com/security/cve/CVE-2022-0084 | vendor advisory |
https://github.com/xnio/xnio/pull/291 | third party advisory patch |
https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12 | third party advisory patch |