-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 30 Oct 2023 18:19:14 CET Source: jetty9 Architecture: source Version: 9.4.50-4+deb10u1 Distribution: buster-security Urgency: high Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org> Changed-By: Markus Koschany <apo@debian.org> Checksums-Sha1: 4c6b56a7ac350de3186eb3c538dbfb5d6062101f 2779 jetty9_9.4.50-4+deb10u1.dsc 3804e02da535f6e62272ae6834bad323b74f17a9 81472 jetty9_9.4.50-4+deb10u1.debian.tar.xz 36155f52e6dafed60af1d2dbc1036819fc032a98 17839 jetty9_9.4.50-4+deb10u1_amd64.buildinfo Checksums-Sha256: 1c1fda24933ef2d4b88c158b8fede28f09231b334a68b0a30b2b717394511a23 2779 jetty9_9.4.50-4+deb10u1.dsc 0c19525f38ad12114da0f3b91eb278390c863c9e48589d4798d9e5f866c49e9b 81472 jetty9_9.4.50-4+deb10u1.debian.tar.xz 0069f49ed49e16c0d277945c7fc6ce732acef288e807b60d007b19b4d299cfb6 17839 jetty9_9.4.50-4+deb10u1_amd64.buildinfo Changes: jetty9 (9.4.50-4+deb10u1) buster-security; urgency=high . * Team upload. * Backport Jetty 9 version from Bookworm. * Revert to compat level 12 and servlet-api 3.1. * Fix CVE-2023-36478 and CVE-2023-44487: Two remotely exploitable security vulnerabilities were discovered in Jetty 9, a Java based web server and servlet engine. The HTTP/2 protocol implementation did not sufficiently verify if HPACK header values exceed their size limit. Furthermore the HTTP/2 protocol allowed a denial of service (server resource consumption) because request cancellation can reset many streams quickly. This problem is also known as Rapid Reset Attack. * Fix CVE-2020-27218: If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request. Files: 91c5e2625ebe6cdf4a98c331fc238137 2779 java optional jetty9_9.4.50-4+deb10u1.dsc 537da7b127f4c3f17a22bab056338c90 81472 java optional jetty9_9.4.50-4+deb10u1.debian.tar.xz 2faa413f0d64bf7a389ec565e3d910f3 17839 java optional jetty9_9.4.50-4+deb10u1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmVAAW9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1HkG6EQAKm5uqdmnB3OYelcjZSeDKR0dUrLoA/oVMkK 23G9CIIs6VKH8qIY1kI5WVrbIfbu9O05Y7GWf4Wzpn1ohrH3hFuaD8OtbIuOdrc2 MI8rsxoMOSo/Hp9IOa74V19GXkhMrZvqZGjO3SHMNyZgkHVL9cwGWzsxyVy0JKoI vP/mg5yPQ/iFe7OTibj/8GXaXfZQbXIbJnd1GkMRiTj//6JlM6TY/BHusx14YB4Z kTkYLfqjs7thuCbYJG566XKk4rjwvkhAjzRabGQNU253HD6+mCeJAv9dvgIsxM/g s+vFUDoJQzk3cn/ybgzaEVeFxEVovuzizxN/7R1QclHgKc9cjIolzjBL6My4EPGQ zkCr+T/TW0nFYaNHmSgIWvAWmye/n06QlNvH1uXPlJA4Htoz2sodqfKJpalHUdUm 4Ub+fEEdp2EZZcQNMsdGCkqaJE+tH1ZuNhE6sfc6F2jiv5n1PaEYkhqVB7W3oBFV e2WYrgSYMFHOtN+H75QA/+0KbsjTNsgv9XJHgnpwFEM2KYelk12ENGRXd70HKifY GTrTQuUCYJAEIBQZ33ns7lmg4hPd1T1hh/kSXJWJbydSvFSl/QjW8n5b49eGfQu0 GwpNncUZOmfz9aTqtsRC6c6lBkgVqlGyCdH5F7l1VJO6JfrzRXbzWqVSWjdPzWLu B9utIbzw =EBqD -----END PGP SIGNATURE-----