Discover details of CVE-2022-2191 impacting Eclipse Jetty versions 10.0.0 to 10.0.9 and 11.0.0 to 11.0.9. Learn about the security risks, impact, and mitigation measures.
Eclipse Jetty versions 10.0.0 through 10.0.9 and 11.0.0 through 11.0.9 are impacted by a vulnerability where SslConnection fails to release ByteBuffers from configured ByteBufferPool on error code paths.
Understanding CVE-2022-2191
This CVE affects Eclipse Jetty, leading to potential security risks due to the improper handling of memory resources.
What is CVE-2022-2191?
In versions 10.0.0 to 10.0.9 and 11.0.0 to 11.0.9 of Eclipse Jetty, the SslConnection component does not properly release ByteBuffers in certain error scenarios, raising security concerns.
The Impact of CVE-2022-2191
The vulnerability poses a high availability impact, with a CVSS base score of 7.5, creating a risk of unauthorized access and exploitation through network interactions.
Technical Details of CVE-2022-2191
The technical aspects of the CVE include:
Vulnerability Description
SslConnection in affected Jetty versions does not release ByteBuffers from the ByteBufferPool during error code paths, potentially leading to resource exhaustion and denial of service.
Affected Systems and Versions
Eclipse Jetty versions 10.0.0 to 10.0.9 and 11.0.0 to 11.0.9 are confirmed to be impacted by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by triggering error conditions that cause SslConnection to mishandle ByteBuffers, potentially leading to service disruptions.
Mitigation and Prevention
To address CVE-2022-2191, consider the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
The Eclipse Foundation has released patches for the affected Jetty versions. Ensure prompt application of these updates to mitigate the CVE-2022-2191 vulnerability.