First published: Thu Jul 09 2020(Updated: )
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/resteasy | <4.5.6. | 4.5.6. |
Redhat Integration Camel K | ||
Redhat Resteasy | >=4.2.0<4.5.6 | |
NetApp OnCommand Insight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2020-14326.
The severity of CVE-2020-14326 is high with a severity value of 7.
CVE-2020-14326 can cause a denial of service by causing hash flooding, resulting in slower requests and higher CPU time.
RESTEasy version 4.5.6 is affected by CVE-2020-14326.
To fix CVE-2020-14326, update RESTEasy to version 4.5.7 or higher.