CVE-2022-2048

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/09/09/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/09/09/2 - Mailing List, Third Party Advisory
References () https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j - Third Party Advisory () https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20220901-0006/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220901-0006/ - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5198 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5198 - Third Party Advisory

24 Jul 2023, 13:16

Type Values Removed Values Added
CWE CWE-400 NVD-CWE-Other
References (MLIST) http://www.openwall.com/lists/oss-security/2022/09/09/2 - Third Party Advisory (MLIST) http://www.openwall.com/lists/oss-security/2022/09/09/2 - Mailing List, Third Party Advisory

Information

Published : 2022-07-07 21:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2048

Mitre link : CVE-2022-2048

CVE.ORG link : CVE-2022-2048


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • snapcenter
  • solidfire_\&_hci_storage_node
  • management_services_for_element_software_and_netapp_hci
  • element_plug-in_for_vcenter_server
  • hci_compute_node

eclipse

  • jetty

jenkins

  • jenkins
CWE
CWE-410

Insufficient Resource Pool

CWE-664

Improper Control of a Resource Through its Lifetime

NVD-CWE-Other