Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.2636 jetty9 security update 5 August 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: jetty9 Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Increased Privileges -- Existing Account Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-34428 CVE-2020-28169 CVE-2020-28165 CVE-2020-27223 CVE-2020-27216 CVE-2019-10247 CVE-2019-10241 Reference: ASB-2021.0152 ESB-2021.2286 ESB-2021.1660 ESB-2020.4269 Original Bulletin: http://www.debian.org/security/2021/dsa-4949 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4949-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 04, 2021 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : jetty9 CVE ID : CVE-2019-10241 CVE-2019-10247 CVE-2020-27216 CVE-2020-27223 CVE-2020-28165 CVE-2020-28169 CVE-2021-34428 Multiple vulnerabilities were discovered in Jetty, a Java servlet engine and webserver which could result in cross-site scripting, information disclosure, privilege escalation or denial of service. For the stable distribution (buster), these problems have been fixed in version 9.4.16-0+deb10u1. We recommend that you upgrade your jetty9 packages. For the detailed security status of jetty9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jetty9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmELC8oACgkQEMKTtsN8 TjZxsg/+L9a9Soj91or7HujO/ZN3METABLUThcEXs5Pkjv7A7SIKaxPLQs4Y/ltJ C9bDixpE7zSxM5RYmrEoRVH/FTbvrwE4VmIC2KuMRaS450hROMZ2zCLTo0BgFrDS Mjp/Fgk3h1o0JpEhk2wo/BFDoHgusXGYqcx/m6Q4khdctl7qP5PPPRfqn22Ewmd8 M6Uon1icIr9QFoAXDaaJpyK4Q9YsdouinnkmvYjUp4eTv9YbanqyRvI5tA/1anaf t4Rs9w3z26kGteTLa/eOhlrP+zvUi3ws27HbV66suTfJ0e3UY01jHVE7jpsVlLSB za/WifUlKzvKDepg0Ci1oig3wF19oK+G9meqEWx2MOjuMKKY8Wt+nvic8YDGVn6G 6oCVjuscxITCWzhE9XVpvEWhLDxDdwk2vCRn8fe/h+CumSFmhVpwaeGX3OD4rj+P f/0FcVQyf+M03gRMLEHKWFt7l5BMhyh24CRV+0NMfvBq817OZxJtquIUWT2UbhJS E4f6VL2sqTIEDlGfDyUk9Zpp41ce7RR+zpKk2N+apILBTkbCuGJjPqcgIsTZt00l 5S4eGUqB9mwzJg1XPKTiADjx0vD0Gb+ZMg9Tukjd3TJc7b6Pa3vpkW68+aRFNtgI iUl/rp8i65sGVjxyHMHF6uxl5LTNd+30C4fkDekCPoY28oUWsxA= =kkuT - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYQtjmuNLKJtyKPYoAQjLBA/+PErgYNzVzwS/Whp0hroMwsgiuzP+7Cqc 3pLJBP8WM0JVL6ksFYJBEFHIbU6FhookTInScRxRbV69BurVuRa18LGes22Xzcjz f4JLXGs/kP2lWKyFkIKXZAWj8hz0M6TdHyBUOL2AhtSL556OQKwFpDUJxLV65jc9 88+tdtN9CFu+q/CR81OijFSj8UP87KoNg0OYI1D/wEJT5kx+FUk3lILuwSHwuZzX oXSlPV8C8VjQzpBMwIiinMC5CxaCv+nk6572FkP0xjCgHbVPvzmkmgTOPoUW3wZF uChAhkapj4zmI4O6NsLGmet+opISOdHVyz623Qnx28npO189+0+QkQVmuZjCHJjo x86f+DoRg6ZwOutUIjHmNP2Exz+jyQRIq8ZGtTIp5UZLUo2uHr5Fm7uXi6verCQm bW0mAQJgqvrgwPPkAii7dVHAwVJQmBNDpJe1buMO0IUy4gWbgMsClqlczsVold3c BC34pg7s4Zkuv0f3A5A9HG2/W/DpppL9GgD+LQwVFwESXCqebsO6FnkfOid/hZW9 E4fydVIohmIkyNTpORSR4o1N0aBRE6trfO94S+USvFRWxUMorHjfA5aUKIIZE8sA xpCitC7YSTax8VM25KVeERBV+mCJi54kA2Pjrdd66LiyX+Z6bNQgnLdy2ZYIGoeE h6FkWXYFxsw= =7dYW -----END PGP SIGNATURE-----