A flaw was found in Smallrye, where smallrye-fault-tolerance is vulnerable to an out-of-memory (OOM) issue. This vulnerability is externally triggered when calling the metrics URI. Every call creates a new object within meterMap and may lead to a denial of service (DoS) issue.
Workaround:
The product manages a group of objects or resources and performs a separate memory allocation for each object, but it does not properly limit the total amount of memory that is consumed by all of the combined objects.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:3376 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:3541 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:3543 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-2240 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2351452 | issue tracking |
https://github.com/advisories/GHSA-gfh6-3pqw-x2j4 |