Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2048

Опубликовано: 07 июл. 2022
Источник: debian

Описание

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jetty9fixed9.4.48-1package

Примечания

  • https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j

  • https://github.com/eclipse/jetty.project/issues/7935

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

CVSS3: 7.5
redhat
больше 3 лет назад

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

CVSS3: 7.5
nvd
больше 3 лет назад

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

CVSS3: 7.5
github
больше 3 лет назад

Jetty vulnerable to Invalid HTTP/2 requests that can lead to denial of service

CVSS3: 7.5
fstec
больше 3 лет назад

Уязвимость контейнера сервлетов Eclipse Jetty, связанная с недостаточным управлением системными ресурсами, позволяющая нарушителю вызвать отказ в обслуживании