Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. https://github.com/jetty/jetty.project/issues/11256 https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98
Created jetty tracking bugs for this issue: Affects: fedora-all [bug 2266137]
This issue has been addressed in the following products: OCP-Tools-4.13-RHEL-8 Via RHSA-2024:3636 https://access.redhat.com/errata/RHSA-2024:3636
This issue has been addressed in the following products: OCP-Tools-4.14-RHEL-8 Via RHSA-2024:3634 https://access.redhat.com/errata/RHSA-2024:3634
This issue has been addressed in the following products: OCP-Tools-4.12-RHEL-8 Via RHSA-2024:3635 https://access.redhat.com/errata/RHSA-2024:3635
This issue has been addressed in the following products: OCP-Tools-4.15-RHEL-8 Via RHSA-2024:4597 https://access.redhat.com/errata/RHSA-2024:4597
This issue has been addressed in the following products: Red Hat build of Apicurio Registry 2.6.1 GA Via RHSA-2024:4873 https://access.redhat.com/errata/RHSA-2024:4873
This issue has been addressed in the following products: Red Hat build of Apache Camel 4.4.1 for Spring Boot Via RHSA-2024:4884 https://access.redhat.com/errata/RHSA-2024:4884