Bug 2266136 (CVE-2024-22201) - CVE-2024-22201 jetty: stop accepting new connections from valid clients
Summary: CVE-2024-22201 jetty: stop accepting new connections from valid clients
Keywords:
Status: NEW
Alias: CVE-2024-22201
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2266137
Blocks: 2266138
TreeView+ depends on / blocked
 
Reported: 2024-02-26 18:40 UTC by Rohit Keshri
Modified: 2024-07-25 19:26 UTC (History)
62 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Jetty, a Java based web server and servlet engine. If an HTTP/2 connection gets TCP congested, it remains open and idle, and connections may be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:3634 0 None None None 2024-06-05 14:44:34 UTC
Red Hat Product Errata RHSA-2024:3635 0 None None None 2024-06-05 14:45:05 UTC
Red Hat Product Errata RHSA-2024:3636 0 None None None 2024-06-05 14:44:15 UTC
Red Hat Product Errata RHSA-2024:4597 0 None None None 2024-07-17 18:47:08 UTC
Red Hat Product Errata RHSA-2024:4873 0 None None None 2024-07-25 15:04:57 UTC
Red Hat Product Errata RHSA-2024:4884 0 None None None 2024-07-25 19:26:22 UTC

Description Rohit Keshri 2024-02-26 18:40:47 UTC
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.

https://github.com/jetty/jetty.project/issues/11256
https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98

Comment 1 Rohit Keshri 2024-02-26 18:41:09 UTC
Created jetty tracking bugs for this issue:

Affects: fedora-all [bug 2266137]

Comment 6 errata-xmlrpc 2024-06-05 14:44:11 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.13-RHEL-8

Via RHSA-2024:3636 https://access.redhat.com/errata/RHSA-2024:3636

Comment 7 errata-xmlrpc 2024-06-05 14:44:29 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.14-RHEL-8

Via RHSA-2024:3634 https://access.redhat.com/errata/RHSA-2024:3634

Comment 8 errata-xmlrpc 2024-06-05 14:45:01 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.12-RHEL-8

Via RHSA-2024:3635 https://access.redhat.com/errata/RHSA-2024:3635

Comment 9 errata-xmlrpc 2024-07-17 18:47:03 UTC
This issue has been addressed in the following products:

  OCP-Tools-4.15-RHEL-8

Via RHSA-2024:4597 https://access.redhat.com/errata/RHSA-2024:4597

Comment 10 errata-xmlrpc 2024-07-25 15:04:52 UTC
This issue has been addressed in the following products:

  Red Hat build of Apicurio Registry 2.6.1 GA

Via RHSA-2024:4873 https://access.redhat.com/errata/RHSA-2024:4873

Comment 11 errata-xmlrpc 2024-07-25 19:26:18 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.1 for Spring Boot

Via RHSA-2024:4884 https://access.redhat.com/errata/RHSA-2024:4884


Note You need to log in before you can comment on or make changes to this bug.