OpenFGA, an authorization/permission engine, is vulnerable to a denial of service attack in versions prior to 1.4.3. In some scenarios that depend on the model and tuples used, a call to `ListObjects` may not release memory properly. So when a sufficiently high number of those calls are executed, the OpenFGA server can create an `out of memory` error and terminate. Version 1.4.3 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/openfga/openfga/commit/908ac85c8b7769c8042cca31886df8db01976c39 | Patch |
https://github.com/openfga/openfga/releases/tag/v1.4.3 | Release Notes |
https://github.com/openfga/openfga/security/advisories/GHSA-rxpw-85vw-fx87 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-26T16:37:27.065Z
Updated: 2024-01-26T16:37:27.065Z
Reserved: 2024-01-22T22:23:54.337Z
Link: CVE-2024-23820
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-26T17:15:13.287
Modified: 2024-02-01T16:30:14.907
Link: CVE-2024-23820
JSON object: View
Redhat Information
No data.