You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
CVE-2021-28165 - High Severity Vulnerability
Vulnerable Library - jetty-io-7.6.3.v20120416.jar
Administrative parent pom for Jetty modules
Library home page: http://www.eclipse.org/jetty/jetty-io
Path to dependency file: /pom.xml
Path to vulnerable library: /root/.m2/repository/org/eclipse/jetty/jetty-io/7.6.3.v20120416/jetty-io-7.6.3.v20120416.jar
Dependency Hierarchy:
Vulnerability Details
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
Publish Date: 2021-04-01
URL: CVE-2021-28165
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-26vr-8j45-3r4w
Release Date: 2021-04-01
Fix Resolution: org.eclipse.jetty:jetty-io:9.4.39, org.eclipse.jetty:jetty-io:10.0.2, org.eclipse.jetty:jetty-io:11.0.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: