First published: Thu May 08 2025(Updated: )
### Original Report In Eclipse Jetty versions 12.0.0 to 12.0.16 included, an HTTP/2 client can specify a very large value for the HTTP/2 settings parameter SETTINGS_MAX_HEADER_LIST_SIZE. The Jetty HTTP/2 server does not perform validation on this setting, and tries to allocate a ByteBuffer of the specified capacity to encode HTTP responses, likely resulting in OutOfMemoryError being thrown, or even the JVM process exiting. ### Impact Remote peers can cause the JVM to crash or continuously report OOM. ### Patches 12.0.17 ### Workarounds No workarounds. ### References https://github.com/jetty/jetty.project/issues/12690
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.eclipse.jetty.http2:jetty-http2-common | >=12.0.0<=12.0.16 | 12.0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-889j-63jv-qhr8 is considered critical due to the potential for denial of service caused by unvalidated input.
To fix GHSA-889j-63jv-qhr8, upgrade to Jetty version 12.0.17 or later.
GHSA-889j-63jv-qhr8 affects Jetty versions 12.0.0 to 12.0.16 inclusive.
GHSA-889j-63jv-qhr8 is a denial-of-service vulnerability related to HTTP/2 settings in Jetty.
While specific exploits are not detailed, the vulnerability can be exploited by sending large HTTP/2 settings values.