Bug 2305290 (CVE-2024-7885)
Summary: | CVE-2024-7885 undertow: Improper State Management in Proxy Protocol parsing causes information leakage | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Michal Findra <mfindra> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aazores, adupliak, anstephe, arnavarr, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, chfoley, clement.escoffier, cmiranda, dandread, darran.lofthouse, dhanak, dkreling, dosoudil, dpalmer, drichtar, dsimansk, eaguilar, ebaron, ecerquei, eric.wittmann, fjuma, fmariani, fmongiar, frainone, gmalinko, gsmet, ibek, istudens, ivassile, iweiss, janstey, jkang, jkoops, jmartisk, jnethert, jpallich, jpoth, jrokos, jscholz, kingland, kverlaen, lgao, lthon, manderse, matzew, mnovotny, mosmerov, msochure, msvehla, mulliken, nipatil, nwallace, olubyans, pantinor, parichar, pcongius, pdelbell, pdrozd, peholase, pgallagh, pierdipi, pjindal, pmackay, probinso, pskopek, rguimara, rhuss, rkubis, rmartinc, rowaters, rruss, rstancel, rstepani, rsvoboda, saroy, sausingh, sbiarozk, sdouglas, sfroberg, smaestri, sthorger, swoodman, tasato, tcunning, tom.jenkinson, tqvarnst, yfang |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Michal Findra
2024-08-16 09:09:20 UTC
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.4.2 for Spring Boot Via RHSA-2024:6508 https://access.redhat.com/errata/RHSA-2024:6508 This issue has been addressed in the following products: Red Hat build of Apache Camel 3.20.7 for Spring Boot Via RHSA-2024:6883 https://access.redhat.com/errata/RHSA-2024:6883 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 Via RHSA-2024:7441 https://access.redhat.com/errata/RHSA-2024:7441 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8 Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9 Via RHSA-2024:7442 https://access.redhat.com/errata/RHSA-2024:7442 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform Via RHSA-2024:7735 https://access.redhat.com/errata/RHSA-2024:7735 This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9 Via RHSA-2024:7736 https://access.redhat.com/errata/RHSA-2024:7736 This issue has been addressed in the following products: HawtIO 4.0.0 for Red Hat build of Apache Camel 4 Via RHSA-2024:11023 https://access.redhat.com/errata/RHSA-2024:11023 |