vulnerability

Amazon Linux AMI 2: CVE-2021-28165: Security patch for jetty (ALAS-2025-2871)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 1, 2021
Added
May 30, 2025
Modified
May 30, 2025

Description

In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.

Solution(s)

amazon-linux-ami-2-upgrade-jetty-annotationsamazon-linux-ami-2-upgrade-jetty-antamazon-linux-ami-2-upgrade-jetty-clientamazon-linux-ami-2-upgrade-jetty-continuationamazon-linux-ami-2-upgrade-jetty-deployamazon-linux-ami-2-upgrade-jetty-httpamazon-linux-ami-2-upgrade-jetty-ioamazon-linux-ami-2-upgrade-jetty-jaasamazon-linux-ami-2-upgrade-jetty-jaspiamazon-linux-ami-2-upgrade-jetty-javadocamazon-linux-ami-2-upgrade-jetty-jmxamazon-linux-ami-2-upgrade-jetty-jndiamazon-linux-ami-2-upgrade-jetty-jspamazon-linux-ami-2-upgrade-jetty-jspc-maven-pluginamazon-linux-ami-2-upgrade-jetty-maven-pluginamazon-linux-ami-2-upgrade-jetty-monitoramazon-linux-ami-2-upgrade-jetty-plusamazon-linux-ami-2-upgrade-jetty-projectamazon-linux-ami-2-upgrade-jetty-proxyamazon-linux-ami-2-upgrade-jetty-rewriteamazon-linux-ami-2-upgrade-jetty-runneramazon-linux-ami-2-upgrade-jetty-securityamazon-linux-ami-2-upgrade-jetty-serveramazon-linux-ami-2-upgrade-jetty-servletamazon-linux-ami-2-upgrade-jetty-servletsamazon-linux-ami-2-upgrade-jetty-startamazon-linux-ami-2-upgrade-jetty-utilamazon-linux-ami-2-upgrade-jetty-util-ajaxamazon-linux-ami-2-upgrade-jetty-webappamazon-linux-ami-2-upgrade-jetty-websocket-apiamazon-linux-ami-2-upgrade-jetty-websocket-clientamazon-linux-ami-2-upgrade-jetty-websocket-commonamazon-linux-ami-2-upgrade-jetty-websocket-parentamazon-linux-ami-2-upgrade-jetty-websocket-serveramazon-linux-ami-2-upgrade-jetty-websocket-servletamazon-linux-ami-2-upgrade-jetty-xml
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.