Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. | Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6. |
Fri, 07 Feb 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Eclipse Eclipse jetty Netapp Netapp active Iq Unified Manager Netapp bluexp |
|
Weaknesses | CWE-770 | |
CPEs | cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Eclipse Eclipse jetty Netapp Netapp active Iq Unified Manager Netapp bluexp |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:33:34.951Z
Reserved: 2024-01-08T04:59:27.371Z
Link: CVE-2024-22201

Updated: 2024-08-01T22:35:34.848Z

Status : Modified
Published: 2024-02-26T16:27:56.343
Modified: 2025-02-13T18:16:46.810
Link: CVE-2024-22201
