A vulnerability was found in Undertow. This issue requires enabling the learning-push handler in the server's config, which is disabled by default, leaving the maxAge config in the handler unconfigured. The default is -1, which makes the handler vulnerable. If someone overwrites that config, the server is not subject to the attack. The attacker needs to be able to reach the server with a normal HTTP request.
Workaround:
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4392 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5143 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5144 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5145 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:5147 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:6437 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-3653 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2274437 | issue tracking |
https://security.netapp.com/advisory/ntap-20240828-0002/ |