Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8447: Deadlock

0
Medium
VulnerabilityCVE-2024-8447cvecve-2024-8447
Published: Thu Jan 02 2025 (01/02/2025, 20:19:29 UTC)
Source: CVE

Description

A security issue was discovered in the LRA Coordinator component of Narayana. When Cancel is called in LRA, an execution time of approximately 2 seconds occurs. If Join is called with the same LRA ID within that timeframe, the application may crash or hang indefinitely, leading to a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:04:38 UTC

Technical Analysis

CVE-2024-8447 is a vulnerability identified in the Long Running Actions (LRA) Coordinator component of the Narayana transaction manager. The issue arises during the Cancel operation of an LRA, which takes approximately two seconds to complete. If, within this execution window, a Join request is made using the same LRA ID, the system encounters a deadlock or race condition that causes the application to either crash or hang indefinitely. This behavior leads to a denial of service (DoS) condition, impacting the availability of services relying on Narayana for distributed transaction coordination. The vulnerability does not compromise confidentiality or integrity but disrupts service continuity. The CVSS 3.1 score of 5.9 reflects a medium severity, considering that exploitation requires network access but no privileges or user interaction, and the attack complexity is high due to timing requirements. Narayana is widely used in Java EE and microservices environments for managing distributed transactions, making this vulnerability relevant to applications relying on these technologies. No patches or known exploits are currently available, but the issue is publicly disclosed and should be addressed promptly to avoid service disruptions.

Potential Impact

The primary impact of CVE-2024-8447 is a denial of service condition caused by application crashes or indefinite hangs in systems using the Narayana LRA Coordinator. Organizations relying on Narayana for distributed transaction management, especially in microservices or cloud-native applications, may experience service outages or degraded performance. This can affect critical business processes that depend on reliable transaction coordination, potentially leading to operational disruptions and financial losses. While the vulnerability does not expose sensitive data or allow unauthorized modifications, the availability impact can undermine trust in affected services and complicate incident response. The timing-based nature of the exploit means that automated or high-frequency transaction systems are particularly vulnerable, increasing the risk of cascading failures in complex distributed environments.

Mitigation Recommendations

To mitigate CVE-2024-8447, organizations should implement the following specific measures: 1) Avoid invoking Join operations on the same LRA ID concurrently with Cancel operations, particularly within the critical two-second window. This may require redesigning transaction workflows or adding synchronization controls to prevent overlapping calls. 2) Monitor and log LRA Coordinator operations to detect patterns that could lead to deadlocks or hangs, enabling proactive intervention. 3) Apply any vendor-provided patches or updates for Narayana as soon as they become available. 4) Consider implementing circuit breakers or timeout mechanisms around LRA Coordinator calls to prevent indefinite hangs from impacting overall system availability. 5) Conduct thorough testing of distributed transaction scenarios under load to identify and address timing-related issues. 6) Engage with the Narayana community or vendor support channels for guidance and updates on this vulnerability. These steps go beyond generic advice by focusing on transaction coordination logic and timing controls specific to the LRA Coordinator.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-05T01:54:51.271Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec806

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/28/2026, 4:04:38 AM

Last updated: 3/24/2026, 3:04:24 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses