DirectorySecurity Advisories
Sign In
Security Advisories

CGA-m9gp-rqph-jfcv

Published

Last updated

https://images.chainguard.dev/security/CGA-m9gp-rqph-jfcv
Package

druid

Latest Update
Fixed
Fixed Version

31.0.0-r1

Aliases
  • CVE-2024-8184
  • GHSA-g8m5-722r-8whq

Severity

5.9

Medium

CVSS V3

Summary

Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks

Description

Impact

Remote DOS attack can cause out of memory

Description

There exists a security vulnerability in Jetty's ThreadLimitHandler.getRemote() which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory.

Affected Versions

  • Jetty 12.0.0-12.0.8 (Supported)
  • Jetty 11.0.0-11.0.23 (EOL)
  • Jetty 10.0.0-10.0.23 (EOL)
  • Jetty 9.3.12-9.4.55 (EOL)

Patched Versions

  • Jetty 12.0.9
  • Jetty 11.0.24
  • Jetty 10.0.24
  • Jetty 9.4.56

Workarounds

Do not use ThreadLimitHandler.
Consider use of QoSHandler instead to artificially limit resource utilization.

References

Jetty 12 - https://github.com/jetty/jetty.project/pull/11723

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images