Description
A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.

At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
Published: 2024-02-19
Score: 7.5 High
EPSS: 22.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

No mitigation is currently available for this vulnerability. However, there might be some protections, such as request limits by a load balancer in front of JBoss EAP/Wildfly or even Undertow, that could minimize the impact.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0747 A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
Github GHSA Github GHSA GHSA-w6qf-42m7-vh68 Undertow Uncontrolled Resource Consumption Vulnerability
History

Tue, 17 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:quarkus:2

Wed, 25 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4.1

Wed, 25 Jun 2025 00:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
References

Tue, 24 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4::el6

Wed, 07 May 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Netapp
Netapp active Iq Unified Manager
Netapp oncommand Workflow Automation
Redhat fuse
Redhat integration Camel For Spring Boot
Redhat openshift Container Platform
Redhat openshift Container Platform For Linuxone
Redhat openshift Container Platform For Power
Redhat single Sign-on
CPEs cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*
Vendors & Products Netapp
Netapp active Iq Unified Manager
Netapp oncommand Workflow Automation
Redhat fuse
Redhat integration Camel For Spring Boot
Redhat openshift Container Platform
Redhat openshift Container Platform For Linuxone
Redhat openshift Container Platform For Power
Redhat single Sign-on

Mon, 28 Apr 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus
References

Thu, 20 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat apache Camel Spring Boot
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4.1
Vendors & Products Redhat apache Camel Spring Boot
References

Thu, 27 Feb 2025 10:45:00 +0000

Type Values Removed Values Added
References

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Sat, 19 Oct 2024 00:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:camel_spring_boot:4

Thu, 19 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 08:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:build_keycloak:22 cpe:/a:redhat:build_keycloak:

Subscriptions

Netapp Active Iq Unified Manager Oncommand Workflow Automation
Redhat Amq Streams Apache Camel Spring Boot Build Keycloak Camel Quarkus Camel Spring Boot Fuse Integration Integration Camel For Spring Boot Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Application Platform Eus Jboss Enterprise Bpms Platform Jboss Fuse Jboss Fuse Service Works Openshift Container Platform Openshift Container Platform For Linuxone Openshift Container Platform For Power Optaplanner Quarkus Red Hat Single Sign On Rhosemc Serverless Service Registry Single Sign-on
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-17T20:16:47.818Z

Reserved: 2024-02-19T17:25:58.418Z

Link: CVE-2024-1635

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.580Z

cve-icon NVD

Status : Modified

Published: 2024-02-19T22:15:48.647

Modified: 2025-06-25T01:15:22.900

Link: CVE-2024-1635

cve-icon Redhat

Severity : Important

Publid Date: 2023-10-27T00:00:00Z

Links: CVE-2024-1635 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses