CVE-2024-9622

Publication date 8 October 2024

Last updated 14 January 2025


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

A vulnerability was found in the resteasy-netty4 library arising from improper handling of HTTP requests using smuggling techniques. When an HTTP smuggling request with an ASCII control character is sent, it causes the Netty HttpObjectDecoder to transition into a BAD_MESSAGE state. As a result, any subsequent legitimate requests on the same connection are ignored, leading to client timeouts, which may impact systems using load balancers and expose them to risk.

Read the notes from the security team

Status

Package Ubuntu Release Status
resteasy 24.10 oracular
Vulnerable
24.04 LTS noble
Vulnerable
22.04 LTS jammy
Vulnerable
20.04 LTS focal
Vulnerable
16.04 LTS xenial
Vulnerable
resteasy3.0 24.10 oracular
Vulnerable
24.04 LTS noble
Vulnerable
22.04 LTS jammy
Vulnerable
20.04 LTS focal
Vulnerable
18.04 LTS bionic
Vulnerable

Notes


noam-ns

Patching PR opened upstream on Nov 14 2024, still open as of Jan 14 2025 "affected from 0 before 6.2.10" according to filed CVE

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact Low
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L