Resource Exhaustion Affecting pki-core:10.6/tomcatjss package, versions <0:7.7.1-2.module+el8.8.0+22366+77f9de5e


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Resource Exhaustion vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-PKICORE-8318071
  • published31 Oct 2024
  • disclosed23 Sept 2024

Introduced: 23 Sep 2024

CVE-2024-38286  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade RHEL:8 pki-core:10.6/tomcatjss to version 0:7.7.1-2.module+el8.8.0+22366+77f9de5e or higher.
This issue was patched in RHSA-2024:8543.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pki-core:10.6/tomcatjss package and not the pki-core:10.6/tomcatjss package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.

Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.

CVSS Scores

version 3.1