Allocation of Resources Without Limits or Throttling Affecting logstash-8 package, versions <8.18.2-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.07% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CHAINGUARDLATEST-LOGSTASH8-10343255
  • published11 Jun 2025
  • disclosed4 Jun 2025

Introduced: 4 Jun 2025

CVE-2025-49007  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade Chainguard logstash-8 to version 8.18.2-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream logstash-8 package and not the logstash-8 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

CVSS Base Scores

version 3.1