Debian 10166 Published by

A jetty9 security update has been released for Debian GNU/Linux 11 and 12 to address two remotely exploitable security vulnerabilities.



[SECURITY] [DSA 5540-1] jetty9 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5540-1 security@debian.org
https://www.debian.org/security/ Markus Koschany
October 30, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : jetty9
CVE ID : CVE-2023-36478 CVE-2023-44487

Two remotely exploitable security vulnerabilities were discovered in Jetty 9, a
Java based web server and servlet engine. The HTTP/2 protocol implementation
did not sufficiently verify if HPACK header values exceed their size limit.
Furthermore the HTTP/2 protocol allowed a denial of service (server resource
consumption) because request cancellation can reset many streams quickly. This
problem is also known as Rapid Reset Attack.

For the oldstable distribution (bullseye), these problems have been fixed
in version 9.4.50-4+deb11u1.

For the stable distribution (bookworm), these problems have been fixed in
version 9.4.50-4+deb12u2.

We recommend that you upgrade your jetty9 packages.

For the detailed security status of jetty9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jetty9

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/