File _patchinfo of Package patchinfo.29061
<patchinfo incident="29061">
<issue tracker="cve" id="2023-26048"/>
<issue tracker="cve" id="2023-26049"/>
<issue tracker="bnc" id="1210621">VUL-0: CVE-2023-26049: jetty-minimal,jetty-websocket: Cookie parsing of quoted values can exfiltrate values from other cookies</issue>
<issue tracker="bnc" id="1210620">VUL-0: CVE-2023-26048: jetty-minimal,jetty-websocket: OutOfMemoryError for large multipart without filename read via request.getParameter()</issue>
<packager>fstrba</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for jetty-minimal</summary>
<description>This update for jetty-minimal fixes the following issues:
Updated to version 9.4.51.v20230217:
- CVE-2023-26048: Fixed an excessive memory consumption when
processing a large multipart request (bsc#1210620)
- CVE-2023-26049: Fixed a cookie exfiltration issue due to improper
parsing (bsc#1210621).
</description>
</patchinfo>