Bug 1220437 (CVE-2024-22201)

Summary: VUL-0: CVE-2024-22201: jetty-minimal,jetty-websocket: denial of service via HTTP/2 connection leak
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: carlos.lopez
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/395165/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-22201:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-02-27 12:09:37 UTC
Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The vulnerability is patched in 9.4.54, 10.0.20, 11.0.20, and 12.0.6.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-22201
https://www.cve.org/CVERecord?id=CVE-2024-22201
https://github.com/jetty/jetty.project/issues/11256
https://github.com/jetty/jetty.project/security/advisories/GHSA-rggv-cv7r-mw98
https://bugzilla.redhat.com/show_bug.cgi?id=2266136
Comment 1 Carlos López 2024-02-27 12:10:31 UTC
Relevant for:
 - SUSE:SLE-15-SP2:Update/jetty-websocket
 - SUSE:SLE-15-SP2:Update/jetty-minimal
 - openSUSE:Factory/jetty-minimal
Comment 3 OBSbugzilla Bot 2024-02-27 13:35:01 UTC
This is an autogenerated message for OBS integration:
This bug (1220437) was mentioned in
https://build.opensuse.org/request/show/1152265 Factory / jetty-minimal
Comment 4 Maintenance Automation 2024-03-08 12:30:09 UTC
SUSE-SU-2024:0817-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1220437
CVE References: CVE-2024-22201
Sources used:
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Enterprise Storage 7.1 (src): jetty-minimal-9.4.54-150200.3.25.1
openSUSE Leap 15.5 (src): jetty-minimal-9.4.54-150200.3.25.1
Development Tools Module 15-SP5 (src): jetty-minimal-9.4.54-150200.3.25.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): jetty-minimal-9.4.54-150200.3.25.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Fridrich Strba 2024-03-09 18:55:53 UTC
fixed, reassigning to security for closing.