File _patchinfo of Package patchinfo.31060

<patchinfo incident="31060">
  <issue tracker="cve" id="2023-36479"/>
  <issue tracker="cve" id="2023-40167"/>
  <issue tracker="cve" id="2023-41900"/>
  <issue tracker="cve" id="2023-44487"/>
  <issue tracker="cve" id="2023-36478"/>
  <issue tracker="bnc" id="1215415">VUL-1: CVE-2023-36479: jetty-websocket,jetty-minimal: Errant command quoting in org.eclipse.jetty.servlets.CGI Servlet</issue>
  <issue tracker="bnc" id="1215417">VUL-0: CVE-2023-40167: jetty-minimal,jetty-websocket: accepts "+" prefixed value in Content-Length</issue>
  <issue tracker="bnc" id="1215416">VUL-0: CVE-2023-41900: jetty-websocket,jetty-minimal: OpenId Revoked authentication allows one request</issue>
  <issue tracker="bnc" id="1216169">VUL-0: netty: protect against DDOS caused by RST floods (CVE-2023-44487)</issue>
  <issue tracker="bnc" id="1216162">VUL-0: CVE-2023-36478: jetty-minimal,jetty-websocket: HTTP/2 HPACK integer overflow and buffer allocation</issue>
  <packager>fstrba</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for jetty-minimal</summary>
  <description>This update for jetty-minimal fixes the following issues:

- Updated to version 9.4.53.v20231009:

  - CVE-2023-44487: Fixed a potential denial of service scenario via
    RST frame floods (bsc#1216169).
  - CVE-2023-36478: Fixed an integer overflow in the HTTP/2 HPACK
    decoder (bsc#1216162).
  - CVE-2023-40167: Fixed a permissive HTTP header parsing issue that
    could potentially lead to HTTP smuggling attacks (bsc#1215417).
  - CVE-2023-36479: Fixed an incorrect command execution when sending
    requests with certain characters in requested filenames
    (bsc#1215415).
  - CVE-2023-41900: Fixed an issue where an invalidated session would
    be allowed to perform a single request (bsc#1215416).
</description>
</patchinfo>
openSUSE Build Service is sponsored by