Back to jetty9 PTS page

Accepted jetty9 9.4.50-4+deb11u2 (source) into oldstable-proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun,  7 Apr 2024 22:49:33 CEST
Source: jetty9
Architecture: source
Version: 9.4.50-4+deb11u2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
 1539d13ba4341fe5eec0a3e195d66ff76812104a 2836 jetty9_9.4.50-4+deb11u2.dsc
 2b48743903f7d0623255195fb0e1563909a2ea52 82504 jetty9_9.4.50-4+deb11u2.debian.tar.xz
 37b324da65af26116b0352d19549db8eaef34240 18286 jetty9_9.4.50-4+deb11u2_amd64.buildinfo
Checksums-Sha256:
 a21c23876118a5b2b17e6267d96f1f779e88a7ec4862958e7f70d54bdcf11745 2836 jetty9_9.4.50-4+deb11u2.dsc
 36a1a54b523d344b365ff64e3ca7df7b7b721cf2623387231ea3e6200ed96b0e 82504 jetty9_9.4.50-4+deb11u2.debian.tar.xz
 8357bb628296395b64e3fd5ba97d3e1d6b6212729c9f71fc29ccbee5f2d9442b 18286 jetty9_9.4.50-4+deb11u2_amd64.buildinfo
Changes:
 jetty9 (9.4.50-4+deb11u2) bullseye-security; urgency=high
 .
   * Team upload.
   * Fix CVE-2024-22201:
     It was discovered that remote attackers may leave many HTTP/2 connections
     in ESTABLISHED state (not closed), TCP congested and idle. Eventually the
     server will stop accepting new connections from valid clients which can
     cause a denial of service.
Files:
 06c9cb5146f82dbfda67a9d227930386 2836 java optional jetty9_9.4.50-4+deb11u2.dsc
 745178ccdc0e1602550e783bcc8e5d21 82504 java optional jetty9_9.4.50-4+deb11u2.debian.tar.xz
 ec4ab78baa8de1185594e5213e973a6e 18286 java optional jetty9_9.4.50-4+deb11u2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Npv+
-----END PGP SIGNATURE-----

Attachment: pgpcWSi5omtXo.pgp
Description: PGP signature