Debian Package Tracker
Register | Log in
Subscribe

undertow

flexible performant web server written in Java

Choose email to subscribe with

general
  • source: undertow (main)
  • version: 2.3.18-2
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Markus Koschany [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • testing: 2.3.18-2
  • unstable: 2.3.18-2
versioned links
  • 2.3.18-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libundertow-java
action needed
Marked for autoremoval on 22 May: #1103966 high
Version 2.3.18-2 of undertow is marked for autoremoval from testing on Thu 22 May 2025. It is affected by #1103966. You should try to prevent the removal by fixing these RC bugs.
Created: 2025-04-30 Last update: 2025-05-08 21:00
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2023-5379: A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).
  • CVE-2024-6162: A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up.
Created: 2023-09-06 Last update: 2025-03-22 04:01
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2023-5379: A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).
  • CVE-2024-6162: A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up.
Created: 2023-02-24 Last update: 2025-03-22 04:01
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-03-17 Last update: 2025-04-10 09:31
news
[rss feed]
  • [2025-03-22] undertow 2.3.18-2 MIGRATED to testing (Debian testing watch)
  • [2025-03-16] Accepted undertow 2.3.18-2 (source) into unstable (Emmanuel Bourg)
  • [2025-01-09] undertow 2.3.18-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-03] Accepted undertow 2.3.18-1 (source) into unstable (Markus Koschany)
  • [2024-05-12] undertow REMOVED from testing (Debian testing watch)
  • [2023-09-06] undertow 2.3.8-2 MIGRATED to testing (Debian testing watch)
  • [2023-08-22] Accepted undertow 2.3.8-2 (source) into unstable (Markus Koschany)
  • [2023-08-20] Accepted undertow 2.3.8-1 (source) into experimental (Markus Koschany)
  • [2023-01-20] undertow REMOVED from testing (Debian testing watch)
  • [2022-11-18] undertow 2.2.21-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-12] Accepted undertow 2.2.21-1 (source) into unstable (Markus Koschany)
  • [2022-10-19] undertow 2.2.20-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-13] Accepted undertow 2.2.20-1 (source) into unstable (Markus Koschany)
  • [2022-08-23] undertow 2.2.19-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-18] Accepted undertow 2.2.19-1 (source) into unstable (Markus Koschany)
  • [2022-08-08] undertow 2.2.18-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-02] Accepted undertow 2.2.18-1 (source) into unstable (Markus Koschany)
  • [2022-05-06] undertow 2.2.17-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-30] Accepted undertow 2.2.17-1 (source) into unstable (Markus Koschany)
  • [2022-02-17] undertow 2.2.16-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-12] Accepted undertow 2.2.16-1 (source) into unstable (Markus Koschany)
  • [2021-12-24] undertow 2.2.14-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-18] Accepted undertow 2.2.14-1 (source) into unstable (Markus Koschany)
  • [2021-11-30] undertow 2.2.13-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-25] Accepted undertow 2.2.13-1 (source) into unstable (Markus Koschany)
  • [2021-10-07] undertow 2.2.12-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-01] Accepted undertow 2.2.12-1 (source) into unstable (Markus Koschany)
  • [2021-08-24] undertow 2.2.10-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-18] Accepted undertow 2.2.10-1 (source) into unstable (Markus Koschany)
  • [2021-07-11] Accepted undertow 2.2.8-1 (source) into unstable (Markus Koschany)
  • 1
  • 2
bugs [bug history graph]
  • all: 3
  • RC: 1
  • I&N: 2
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.3.18-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing