Bug 2298555 (CVE-2024-6875)

Summary: CVE-2024-6875 infinispan: infinispan: REST compare API has buffer leak
Product: [Other] Security Response Reporter: Patrick Del Bello <pdelbell>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: chazlett, pjindal, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Patrick Del Bello 2024-07-18 05:05:35 UTC
The REST compare API has buffer leak issue in RHDG, and I have
confirmed that "OutOfMemoryError: Direct buffer memory" can occur when
sending a request with some extent size of POST data (like 1MiB) to the
REST API continually.

As the REST endpoint is secured (= authentication is required) by default
in RHDG, it's not possible for anonymous attackers to utilize this issue.
However, a malicious user can utilize this issue for DoS attack.
Hence.