CVE Vulnerabilities

CVE-2022-2048

Insufficient Resource Pool

Published: Jul 07, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

Weakness

The product’s resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources.

Affected Software

NameVendorStart VersionEnd Version
JettyEclipse*9.4.47 (excluding)
JettyEclipse10.0.0 (including)10.0.9 (excluding)
JettyEclipse11.0.0 (including)11.0.9 (excluding)
OpenShift Developer Tools and Services for OCP 4.11RedHatjenkins-0:2.401.1.1686831596-3.el8*
Red Hat AMQ Streams 2.3.0RedHathttp2-server*
Red Hat Fuse 7.11.1RedHathttp2-server*
Red Hat OpenShift Container Platform 4.8RedHatjenkins-0:2.361.1.1672840472-1.el8*
Red Hat OpenShift Container Platform 4.9RedHatjenkins-0:2.361.1.1675668150-1.el8*
JettyUbuntutrusty*
JettyUbuntutrusty/esm*
JettyUbuntuxenial*
Jetty8Ubuntutrusty*
Jetty8Ubuntutrusty/esm*
Jetty8Ubuntuxenial*
Jetty9Ubuntubionic*
Jetty9Ubuntufocal*
Jetty9Ubuntuimpish*
Jetty9Ubuntukinetic*
Jetty9Ubuntuupstream*
Jetty9Ubuntuxenial*

Potential Mitigations

References