[Git][security-tracker-team/security-tracker][master] new jetty issues
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Oct 11 12:02:36 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d6e44583 by Moritz Muehlenhoff at 2023-10-11T13:02:06+02:00
new jetty issues
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -451,7 +451,9 @@ CVE-2023-36548 (A improper neutralization of special elements used in an os comm
CVE-2023-36547 (A improper neutralization of special elements used in an os command (' ...)
NOT-FOR-US: Fortinet
CVE-2023-36478 (Eclipse Jetty provides a web server and servlet container. In versions ...)
- TODO: check
+ - jetty9 9.4.53-1
+ NOTE: https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgh7-54f2-x98r
+ NOTE: https://github.com/eclipse/jetty.project/pull/9634
CVE-2023-36438 (Windows TCP/IP Information Disclosure Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-36436 (Windows MSHTML Platform Remote Code Execution Vulnerability)
@@ -535,6 +537,7 @@ CVE-2023-44487 (The HTTP/2 protocol allows a denial of service (server resource
- haproxy 1.8.13-1
- nginx 1.24.0-2 (unimportant; bug #1053770)
- nghttp2 <unfixed> (bug #1053769)
+ - jetty9 9.4.53-1
NOTE: Tomcat: https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49 (10.1.x)
NOTE: Tomcat: https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a (9.0.x)
NOTE: ATS: https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
@@ -548,6 +551,8 @@ CVE-2023-44487 (The HTTP/2 protocol allows a denial of service (server resource
NOTE: nghttp2: https://github.com/nghttp2/nghttp2/pull/1961
NOTE: nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
NOTE: nghttp2: https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
+ NOTE: jetty9: https://github.com/eclipse/jetty.project/issues/10679
+ NOTE: jetty9: https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.53.v20231009
NOTE: https://www.openwall.com/lists/oss-security/2023/10/10/6
NOTE: https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
NOTE: Go uses CVE-2023-39325 to track this
=====================================
data/dsa-needed.txt
=====================================
@@ -25,6 +25,8 @@ gpac/oldstable (jmm)
--
gst-plugins-bad1.0 (carnil)
--
+jetty9
+--
libcue (jmm)
--
libreswan (jmm)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6e445839647b9218fe7cb32a44f536d03a6796e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6e445839647b9218fe7cb32a44f536d03a6796e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231011/3f8ea409/attachment.htm>
More information about the debian-security-tracker-commits
mailing list