Debian alert DSA-6006-1 (jetty12)
From: | Moritz Muehlenhoff <jmm@debian.org> | |
To: | debian-security-announce@lists.debian.org | |
Subject: | [SECURITY] [DSA 6006-1] jetty12 security update | |
Date: | Fri, 19 Sep 2025 18:37:46 +0000 | |
Message-ID: | <aM2i-gw__OPEjlzD@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6006-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff September 19, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : jetty12 CVE ID : CVE-2025-5115 This update for Jetty, a Java servlet engine and web server, addresses a protocol-level vulnerability in HTTP/2 support also referred to as "MadeYouReset". For the stable distribution (trixie), this problem has been fixed in version 12.0.17-3.1~deb13u1. We recommend that you upgrade your jetty12 packages. For the detailed security status of jetty12 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jetty12 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIxBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmjNoScACgkQEMKTtsN8 TjahZA/vRIiDIsprz0GlP5Eeh/J8b5eSD/vCu6J6uXnrPSkYhWR34qt6usfsPSJv T3obgT1PWbJNLvOjs/PHNpOtACIqjKn9u1e06ofOm9DC8EFp1xQfZ0A58X/SM7Nz 8P3DnLh0HCUd7kNAtjNNmmwbhs/xVcurNxoP2E/WaT4rwbbIMatB9BGUCdw7Uz3/ 1P6/kqcdUX7l8gIMNb7RPeetVPKoJ4OZSKQNSASRhBYRGxnpUSI8o1pHmPyKt0Ic b2OFBOUkhwjV6z45bsMocDlxEZZpHs8YIMBq299E5424mZ3efvJJiZQz6igL31CJ 9+t2CiM7jV0bM0G4etwUhESW7CdlcuW3EwLdVpW+HkXDP8sGwz9Tfdgt1dN3KNsg HmnNAgmhFZaIcMDF8Pr/fRBbpdblkKWXEZB2eeg/KeFex0CAdrAuPAPWlMYwxOTn /6w1UeAio3ZLL+r3Lv+cesqkGcVQ25X86gzi6aRvXtpbZrjYzxnQ+MZnTeVA8kKU HbZHkhoz3ghYZue/JQUysyKMz5hxdQDNPKzaBUr/twqFvRPYDE+0KgB3QGI/ldY2 tvU5gNTvTLLNQiD0NyIn7kgVvvOO/zWOfV7AVtv/L800Z8uJpdorUesxOngweEMk q/CvhxhXuTCcn/1Ap4KxkUvJXiGRATbrnFv6GTj7S60kX+t1 =RdYO -----END PGP SIGNATURE-----