Description
A vulnerability in the Eclipse Vert.x toolkit results in a memory leak due to using Netty FastThreadLocal data structures. Specifically, when the Vert.x HTTP client establishes connections to different hosts, triggering the memory leak. The leak can be accelerated with intimate runtime knowledge, allowing an attacker to exploit this vulnerability. For instance, a server accepting arbitrary internet addresses could serve as an attack vector by connecting to these addresses, thereby accelerating the memory leak.
Published: 2024-03-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0823 A vulnerability in the Eclipse Vert.x toolkit results in a memory leak due to using Netty FastThreadLocal data structures. Specifically, when the Vert.x HTTP client establishes connections to different hosts, triggering the memory leak. The leak can be accelerated with intimate runtime knowledge, allowing an attacker to exploit this vulnerability. For instance, a server accepting arbitrary internet addresses could serve as an attack vector by connecting to these addresses, thereby accelerating the memory leak.
Github GHSA Github GHSA GHSA-5667-3wch-7q7w Eclipse Vert.x memory leak
History

Wed, 25 Jun 2025 02:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4.1

Tue, 24 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4::el6

Mon, 25 Nov 2024 05:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Fri, 22 Nov 2024 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Thu, 19 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak:22 cpe:/a:redhat:build_keycloak:

Subscriptions

Redhat A Mq Clients Amq Broker Amq Streams Apache Camel Spring Boot Build Keycloak Camel Quarkus Camel Spring Boot Cryostat Integration Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Bpms Platform Jboss Fuse Jbosseapxp Migration Toolkit Applications Migration Toolkit Runtimes Optaplanner Quarkus Serverless Service Registry
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-07T10:49:20.769Z

Reserved: 2024-01-29T10:54:44.360Z

Link: CVE-2024-1023

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.343Z

cve-icon NVD

Status : Deferred

Published: 2024-03-27T08:15:38.140

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-1023

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-26T00:00:00Z

Links: CVE-2024-1023 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses