Bug 2266136 (CVE-2024-22201) - CVE-2024-22201 jetty: stop accepting new connections from valid clients
Summary: CVE-2024-22201 jetty: stop accepting new connections from valid clients
Keywords:
Status: NEW
Alias: CVE-2024-22201
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2266137
Blocks: 2266138
TreeView+ depends on / blocked
 
Reported: 2024-02-26 18:40 UTC by Rohit Keshri
Modified: 2024-05-02 18:49 UTC (History)
62 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Jetty, a Java based web server and servlet engine. If an HTTP/2 connection gets TCP congested, it remains open and idle, and connections may be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2024-02-26 18:40:47 UTC
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.

https://github.com/jetty/jetty.project/issues/11256
https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98

Comment 1 Rohit Keshri 2024-02-26 18:41:09 UTC
Created jetty tracking bugs for this issue:

Affects: fedora-all [bug 2266137]


Note You need to log in before you can comment on or make changes to this bug.