製品・ソフトウェアに関する情報
blaze-core におけるリソースの枯渇に関する脆弱性
Title blaze-core におけるリソースの枯渇に関する脆弱性
Summary

blaze-core には、リソースの枯渇に関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Feb. 3, 2021, midnight
Registration Date Oct. 21, 2021, 2:15 p.m.
Last Update Oct. 21, 2021, 2:15 p.m.
CVSS3.0 : 重要
Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
Typelevel
blaze-core 0.14.15 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2021年10月21日]
  掲載
Oct. 21, 2021, 2:15 p.m.

NVD Vulnerability Information
CVE-2021-21293
Summary

blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc.

Publication Date Feb. 3, 2021, 7:15 a.m.
Registration Date Feb. 3, 2021, 10:02 a.m.
Last Update Oct. 25, 2022, 9:56 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:typelevel:blaze:*:*:*:*:*:*:*:* 0.14.15
Related information, measures and tools
Common Vulnerabilities List