Bug 2266136 (CVE-2024-22201)

Summary: CVE-2024-22201 jetty: stop accepting new connections from valid clients
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, apjagtap, asatyam, asoldano, bbaranow, bmaxwell, brian.stansberry, cdewolf, chazlett, chfoley, cmiranda, darran.lofthouse, dfreiber, dhanak, diagrawa, dkreling, dosoudil, dsimansk, ecerquei, eric.wittmann, fjuma, fmariani, fmongiar, gmalinko, ibek, ivassile, iweiss, janstey, jburrell, jnethert, jpoth, jrokos, jscholz, kingland, kverlaen, lgao, matzew, mnovotny, mosmerov, msochure, mstefank, msvehla, nwallace, pantinor, pcongius, pdelbell, pierdipi, pjindal, pmackay, porcelli, rguimara, rhuss, rogbas, rstancel, sabiswas, skontopo, smaestri, swoodman, tcunning, tom.jenkinson, vkumar, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Jetty, a Java based web server and servlet engine. If an HTTP/2 connection gets TCP congested, it remains open and idle, and connections may be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2266137    
Bug Blocks: 2266138    

Description Rohit Keshri 2024-02-26 18:40:47 UTC
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.

https://github.com/jetty/jetty.project/issues/11256
https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98

Comment 1 Rohit Keshri 2024-02-26 18:41:09 UTC
Created jetty tracking bugs for this issue:

Affects: fedora-all [bug 2266137]

Comment 6 errata-xmlrpc 2024-06-05 14:44:11 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.13-RHEL-8

Via RHSA-2024:3636 https://access.redhat.com/errata/RHSA-2024:3636

Comment 7 errata-xmlrpc 2024-06-05 14:44:29 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.14-RHEL-8

Via RHSA-2024:3634 https://access.redhat.com/errata/RHSA-2024:3634

Comment 8 errata-xmlrpc 2024-06-05 14:45:01 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.12-RHEL-8

Via RHSA-2024:3635 https://access.redhat.com/errata/RHSA-2024:3635