Fedora 28: jetty Security Update 2018-48b73ed393
Summary
Jetty is a 100% Java HTTP Server and Servlet Container. This means that you
do not need to configure and run a separate web server (like Apache) in order
to use Java, servlets and JSPs to generate dynamic content. Jetty is a fully
featured web server for static and dynamic content. Unlike separate
server/container solutions, this means that your web server and web
application run in the same process, without interconnection overheads
and complications. Furthermore, as a pure java component, Jetty can be simply
included in your application for demonstration, distribution or deployment.
Jetty is available on all Java supported platforms.
Update to upstream version 9.4.11. Fixes CVE-2017-7656, CVE-2017-7657,
CVE-2017-7658.
* Mon Jul 2 2018 Michael Simacek
- Fix missing classes in start.jar
* Fri Jun 8 2018 Michael Simacek
- Update to upstream version 9.4.11.v20180605
* Wed May 9 2018 Michael Simacek
- Update to upstream version 9.4.10.v20180503
* Mon Apr 30 2018 Michael Simacek
- Update to upstream version 9.4.10.RC1
[ 1 ] Bug #1595620 - CVE-2017-7657 jetty: HTTP request smuggling
https://bugzilla.redhat.com/show_bug.cgi?id=1595620
[ 2 ] Bug #1595621 - CVE-2017-7658 jetty: Incorrect header handling
https://bugzilla.redhat.com/show_bug.cgi?id=1595621
[ 3 ] Bug #1595639 - CVE-2017-7656 jetty: HTTP request smuggling using the range header
https://bugzilla.redhat.com/show_bug.cgi?id=1595639
[ 4 ] Bug #1597418 - CVE-2018-12536 jetty: full server path revealed when using the default Error Handling
https://bugzilla.redhat.com/show_bug.cgi?id=1597418
su -c 'dnf upgrade --advisory FEDORA-2018-48b73ed393' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QJNLQI54CY5A2GFZ4PDZTIGKMXJJUSKM/
FEDORA-2018-48b73ed393 2018-07-12 14:18:11.697410 Product : Fedora 28 Version : 9.4.11 Release : 2.v20180605.fc28 URL : https://eclipse.dev/jetty/ Summary : Java Webserver and Servlet Container Description : Jetty is a 100% Java HTTP Server and Servlet Container. This means that you do not need to configure and run a separate web server (like Apache) in order to use Java, servlets and JSPs to generate dynamic content. Jetty is a fully featured web server for static and dynamic content. Unlike separate server/container solutions, this means that your web server and web application run in the same process, without interconnection overheads and complications. Furthermore, as a pure java component, Jetty can be simply included in your application for demonstration, distribution or deployment. Jetty is available on all Java supported platforms. Update to upstream version 9.4.11. Fixes CVE-2017-7656, CVE-2017-7657, CVE-2017-7658. * Mon Jul 2 2018 Michael Simacek - 9.4.11-2.v20180605 - Fix missing classes in start.jar * Fri Jun 8 2018 Michael Simacek - 9.4.11-1.v20180605 - Update to upstream version 9.4.11.v20180605 * Wed May 9 2018 Michael Simacek - 9.4.10-1.v20180503 - Update to upstream version 9.4.10.v20180503 * Mon Apr 30 2018 Michael Simacek - 9.4.10-0.1.RC1 - Update to upstream version 9.4.10.RC1 [ 1 ] Bug #1595620 - CVE-2017-7657 jetty: HTTP request smuggling https://bugzilla.redhat.com/show_bug.cgi?id=1595620 [ 2 ] Bug #1595621 - CVE-2017-7658 jetty: Incorrect header handling https://bugzilla.redhat.com/show_bug.cgi?id=1595621 [ 3 ] Bug #1595639 - CVE-2017-7656 jetty: HTTP request smuggling using the range header https://bugzilla.redhat.com/show_bug.cgi?id=1595639 [ 4 ] Bug #1597418 - CVE-2018-12536 jetty: full server path revealed when using the default Error Handling https://bugzilla.redhat.com/show_bug.cgi?id=1597418 su -c 'dnf upgrade --advisory FEDORA-2018-48b73ed393' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QJNLQI54CY5A2GFZ4PDZTIGKMXJJUSKM/
Change Log
References