Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FP]: In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame. #6342

Closed
bhaskar-s-019 opened this issue Dec 26, 2023 · 4 comments

Comments

@bhaskar-s-019
Copy link

bhaskar-s-019 commented Dec 26, 2023

Package URl

pkg:maven/org.eclipse.jetty/jetty-util@.*

CPE

cpe:2.3:a:eclipse:jetty::::::::

CVE

CVE-2021-28165

ODC Integration

{"label"=>"Maven Plugin"}

ODC Version

8.4.1

Description

OWASP Dependency Checker (8.4.1) reports Jetty version (9.4.50.v20221201) used in the environment as HIGH, which is inapplicable for the CVE as the vulnerability is only up to 9.4.38.

Please comment.

Copy link
Contributor

Error parsing package url: cpe:2.3:a:eclipse:jetty:::::::: versions from (including) 7.2.2; versions up to (excluding) 9.4.39.

Error: Error: purl is missing the required "pkg" scheme component.

Please correct the package URL - consider copying the package url from the HTML report.

Copy link
Contributor

Failed to automatically evaluate the false positive. See: https://github.com/jeremylong/DependencyCheck/actions/runs/7329140724

Copy link
Contributor

Failed to automatically evaluate the false positive. See: https://github.com/jeremylong/DependencyCheck/actions/runs/7329163104

@aikebah
Copy link
Collaborator

aikebah commented Dec 26, 2023

Your FP is not reproducible on 8.x with an up-to-date database. All CVEs reported for 9.4.50 are valid CVEs applicable to version of jetty beyond 9.4.51.

BTW the version of DependencyCheck you use is outdated and does not receive the latest vulnerability information from NVD anymore.

As the NVD datastreams have been fully replaced by the NVD API as of 15/12 you should update to version 9.x to have information on newly appearing vulnerabilities.

@aikebah aikebah closed this as completed Dec 26, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Dec 14, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants