Sending "NOOP (((...)))" command with 4000 parenthesis open+close results in ~1MB extra memory usage. Longer commands will result in client disconnection. This 1 MB can be left allocated for longer time periods by not sending the command ending LF. So attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections. Attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections. Install fixed version, there is no other remediation. No publicly available exploits are known.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:13498 https://access.redhat.com/errata/RHSA-2026:13498
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:13830 https://access.redhat.com/errata/RHSA-2026:13830
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:13857 https://access.redhat.com/errata/RHSA-2026:13857
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:17602 https://access.redhat.com/errata/RHSA-2026:17602
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:17630 https://access.redhat.com/errata/RHSA-2026:17630
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:17625 https://access.redhat.com/errata/RHSA-2026:17625
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:17628 https://access.redhat.com/errata/RHSA-2026:17628
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:17626 https://access.redhat.com/errata/RHSA-2026:17626