jetty9: CVE-2021-34429

Related Vulnerabilities: CVE-2021-34429   CVE-2021-28164  

Debian Bug report logs - #991188
jetty9: CVE-2021-34429

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 16 Jul 2021 19:21:01 UTC

Owned by: Markus Koschany <apo@debian.org>

Severity: grave

Tags: security, upstream

Found in version jetty9/9.4.39-2

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#991188; Package src:jetty9. (Fri, 16 Jul 2021 19:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Fri, 16 Jul 2021 19:21:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: jetty9: CVE-2021-34429
Date: Fri, 16 Jul 2021 21:16:31 +0200
Source: jetty9
Version: 9.4.39-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for jetty9.

CVE-2021-34429[0]:
| For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 &amp;
| 11.0.1-11.0.5, URIs can be crafted using some encoded characters to
| access the content of the WEB-INF directory and/or bypass some
| security constraints. This is a variation of the vulnerability
| reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-34429
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34429
[1] https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm

Please adjust the affected versions in the BTS as needed. Just from
the upstream versions it is considered to be a problem starting with
9.4.37, but I have *not* checked if we might have an earlier patch
introducing the issue, so please double check, but I suspect the only
version so far affected is the one in bullseye/sid.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>:
Bug#991188; Package src:jetty9. (Fri, 16 Jul 2021 20:51:03 GMT) (full text, mbox, link).


Acknowledgement sent to Markus Koschany <apo@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>. (Fri, 16 Jul 2021 20:51:03 GMT) (full text, mbox, link).


Message #10 received at 991188@bugs.debian.org (full text, mbox, reply):

From: Markus Koschany <apo@debian.org>
To: team <team@security.debian.org>, 991188@bugs.debian.org
Subject: Re: Bug#991188: jetty9: CVE-2021-34429
Date: Fri, 16 Jul 2021 22:44:20 +0200
[Message part 1 (text/plain, inline)]
Control: owner -1 !

Hi,

Am Freitag, dem 16.07.2021 um 21:16 +0200 schrieb Salvatore Bonaccorso:
> Source: jetty9
> Version: 9.4.39-2
> Severity: grave
> Tags: security upstream
> X-Debbugs-Cc: carnil@debian.org, Debian Security Team
> <team@security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for jetty9.
> 
> CVE-2021-34429[0]:
> 

just FYI. I am almost done preparing a buster-security update for Jetty 9 and I
get back to you this weekend. I will take care of this issue for Debian 11 too.

Markus

[signature.asc (application/pgp-signature, inline)]

Owner recorded as Markus Koschany <apo@debian.org>. Request was from Markus Koschany <apo@debian.org> to 991188-submit@bugs.debian.org. (Fri, 16 Jul 2021 20:51:03 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>, Markus Koschany <apo@debian.org>:
Bug#991188; Package src:jetty9. (Sat, 17 Jul 2021 07:18:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>, Markus Koschany <apo@debian.org>. (Sat, 17 Jul 2021 07:18:03 GMT) (full text, mbox, link).


Message #17 received at 991188@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Markus Koschany <apo@debian.org>
Cc: team <team@security.debian.org>, 991188@bugs.debian.org
Subject: Re: Bug#991188: jetty9: CVE-2021-34429
Date: Sat, 17 Jul 2021 09:14:57 +0200
Hi

On Fri, Jul 16, 2021 at 10:44:20PM +0200, Markus Koschany wrote:
> Control: owner -1 !
> 
> Hi,
> 
> Am Freitag, dem 16.07.2021 um 21:16 +0200 schrieb Salvatore Bonaccorso:
> > Source: jetty9
> > Version: 9.4.39-2
> > Severity: grave
> > Tags: security upstream
> > X-Debbugs-Cc: carnil@debian.org, Debian Security Team
> > <team@security.debian.org>
> > 
> > Hi,
> > 
> > The following vulnerability was published for jetty9.
> > 
> > CVE-2021-34429[0]:
> > 
> 
> just FYI. I am almost done preparing a buster-security update for Jetty 9 and I
> get back to you this weekend. I will take care of this issue for Debian 11 too.

Thank you Markus.

Regards,
Salvatore



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Jul 17 16:16:34 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.