Fedora 27: jetty Security Update
Summary
Jetty is a 100% Java HTTP Server and Servlet Container. This means that you
do not need to configure and run a separate web server (like Apache) in order
to use Java, servlets and JSPs to generate dynamic content. Jetty is a fully
featured web server for static and dynamic content. Unlike separate
server/container solutions, this means that your web server and web
application run in the same process, without interconnection overheads
and complications. Furthermore, as a pure java component, Jetty can be simply
included in your application for demonstration, distribution or deployment.
Jetty is available on all Java supported platforms.
Update to upstream version 9.4.11. Fixes CVE-2017-7656, CVE-2017-7657,
CVE-2017-7658, CVE-2018-12538.
* Mon Jul 2 2018 Michael Simacek
- Fix missing classes in start.jar
* Fri Jun 8 2018 Michael Simacek
- Update to upstream version 9.4.11.v20180605
* Wed May 9 2018 Michael Simacek
- Update to upstream version 9.4.10.v20180503
* Mon Apr 30 2018 Michael Simacek
- Update to upstream version 9.4.10.RC1
* Fri Mar 23 2018 Mat Booth
- Make the requirement on "osgi.serviceloader.processor" optional
* Wed Mar 21 2018 Alexander Kurtakov
- Update to upstream 9.4.9 release.
* Fri Feb 9 2018 Igor Gnatenko
- Escape macros in %changelog
* Wed Feb 7 2018 Fedora Release Engineering
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
* Thu Jan 25 2018 Michael Simacek
- Remove obsolete systemd conversion scriptlet
* Mon Dec 4 2017 Michael Simacek
- Update to upstream version 9.4.8.v20171121
* Wed Sep 20 2017 Michael Simacek
- Update to upstream version 9.4.7.v20170914
* Wed Sep 13 2017 Michael Simacek
- Update to upstream version 9.4.7.RC0
[ 1 ] Bug #1595620 - CVE-2017-7657 jetty: HTTP request smuggling
https://bugzilla.redhat.com/show_bug.cgi?id=1595620
[ 2 ] Bug #1595621 - CVE-2017-7658 jetty: Incorrect header handling
https://bugzilla.redhat.com/show_bug.cgi?id=1595621
[ 3 ] Bug #1595639 - CVE-2017-7656 jetty: HTTP request smuggling using the range header
https://bugzilla.redhat.com/show_bug.cgi?id=1595639
[ 4 ] Bug #1595453 - CVE-2018-12538 jetty: HttpSessions access/hijack in the FileSystem's storage for the FileSessionDataStore.
https://bugzilla.redhat.com/show_bug.cgi?id=1595453
[ 5 ] Bug #1597418 - CVE-2018-12536 jetty: full server path revealed when using the default Error Handling
https://bugzilla.redhat.com/show_bug.cgi?id=1597418
su -c 'dnf upgrade --advisory FEDORA-2018-93a507fd0f' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTGKQOGG6ULYU675RIQBC33RQNIKYLVI/
FEDORA-2018-93a507fd0f 2018-07-12 13:45:18.944071 Product : Fedora 27 Version : 9.4.11 Release : 2.v20180605.fc27 URL : https://eclipse.dev/jetty/ Summary : Java Webserver and Servlet Container Description : Jetty is a 100% Java HTTP Server and Servlet Container. This means that you do not need to configure and run a separate web server (like Apache) in order to use Java, servlets and JSPs to generate dynamic content. Jetty is a fully featured web server for static and dynamic content. Unlike separate server/container solutions, this means that your web server and web application run in the same process, without interconnection overheads and complications. Furthermore, as a pure java component, Jetty can be simply included in your application for demonstration, distribution or deployment. Jetty is available on all Java supported platforms. Update to upstream version 9.4.11. Fixes CVE-2017-7656, CVE-2017-7657, CVE-2017-7658, CVE-2018-12538. * Mon Jul 2 2018 Michael Simacek - 9.4.11-2.v20180605 - Fix missing classes in start.jar * Fri Jun 8 2018 Michael Simacek - 9.4.11-1.v20180605 - Update to upstream version 9.4.11.v20180605 * Wed May 9 2018 Michael Simacek - 9.4.10-1.v20180503 - Update to upstream version 9.4.10.v20180503 * Mon Apr 30 2018 Michael Simacek - 9.4.10-0.1.RC1 - Update to upstream version 9.4.10.RC1 * Fri Mar 23 2018 Mat Booth - 9.4.9-2.v20180320 - Make the requirement on "osgi.serviceloader.processor" optional * Wed Mar 21 2018 Alexander Kurtakov 9.4.9-1.v20180320 - Update to upstream 9.4.9 release. * Fri Feb 9 2018 Igor Gnatenko - 9.4.8-4.v20171121 - Escape macros in %changelog * Wed Feb 7 2018 Fedora Release Engineering - 9.4.8-3.v20171121 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild * Thu Jan 25 2018 Michael Simacek - 9.4.8-2.v20171121 - Remove obsolete systemd conversion scriptlet * Mon Dec 4 2017 Michael Simacek - 9.4.8-1.v20171121 - Update to upstream version 9.4.8.v20171121 * Wed Sep 20 2017 Michael Simacek - 9.4.7-1.v20170914 - Update to upstream version 9.4.7.v20170914 * Wed Sep 13 2017 Michael Simacek - 9.4.7.RC0-1 - Update to upstream version 9.4.7.RC0 [ 1 ] Bug #1595620 - CVE-2017-7657 jetty: HTTP request smuggling https://bugzilla.redhat.com/show_bug.cgi?id=1595620 [ 2 ] Bug #1595621 - CVE-2017-7658 jetty: Incorrect header handling https://bugzilla.redhat.com/show_bug.cgi?id=1595621 [ 3 ] Bug #1595639 - CVE-2017-7656 jetty: HTTP request smuggling using the range header https://bugzilla.redhat.com/show_bug.cgi?id=1595639 [ 4 ] Bug #1595453 - CVE-2018-12538 jetty: HttpSessions access/hijack in the FileSystem's storage for the FileSessionDataStore. https://bugzilla.redhat.com/show_bug.cgi?id=1595453 [ 5 ] Bug #1597418 - CVE-2018-12536 jetty: full server path revealed when using the default Error Handling https://bugzilla.redhat.com/show_bug.cgi?id=1597418 su -c 'dnf upgrade --advisory FEDORA-2018-93a507fd0f' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTGKQOGG6ULYU675RIQBC33RQNIKYLVI/
Change Log
References