First published: Mon Feb 26 2024(Updated: )
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. <a href="https://github.com/jetty/jetty.project/issues/11256">https://github.com/jetty/jetty.project/issues/11256</a> <a href="https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98">https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Jetty | <9.4.54<10.0.20<11.0.20<12.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2266136 is high due to the potential for denial of service attacks that can exhaust server resources.
To fix REDHAT-BUG-2266136, update to the latest supported version of Eclipse Jetty that is above 9.4.54, 10.0.20, 11.0.20, or 12.0.6.
REDHAT-BUG-2266136 is caused by an HTTP/2 SSL connection leak during TCP congestion which can lead to resource exhaustion.
Users of Eclipse Jetty versions 9.4.54 and lower, 10.0.20 and lower, 11.0.20 and lower, and 12.0.6 and lower are affected by REDHAT-BUG-2266136.
Yes, if exploited, REDHAT-BUG-2266136 can lead to a service outage due to the exhaustion of file descriptors.