Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jetty9@0?distro=trixie
purl pkg:deb/debian/jetty9@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-6uhn-tn81-cyac Information Exposure In Eclipse Jetty version, the server running on Windows is vulnerable to exposure of the fully qualified Base Resource directory name on Windows to a remote client when it is configured for showing a Listing of directory contents. This information reveal is restricted to only the content in the configured base resource directories. CVE-2019-10246
GHSA-r28m-g6j9-r2h5
VCID-h3wz-rdkt-7ue6 Jetty SslConnection does not release pooled ByteBuffers in case of errors ### Impact `SslConnection` does not release `ByteBuffer`s in case of error code paths. For example, TLS handshakes that require client-auth with clients that send expired certificates will trigger a TLS handshake errors and the `ByteBuffer`s used to process the TLS handshake will be leaked. ### Workarounds Configure explicitly a `RetainableByteBufferPool` with `max[Heap|Direct]Memory` to limit the amount of memory that is leaked. Eventually the pool will be full of "active" entries (the leaked ones) and will provide `ByteBuffer`s that will be GCed normally. _With embedded-jetty_ ``` java int maxBucketSize = 1000; long maxHeapMemory = 128 * 1024L * 1024L; // 128 MB long maxDirectMemory = 128 * 1024L * 1024L; // 128 MB RetainableByteBufferPool rbbp = new ArrayRetainableByteBufferPool(0, -1, -1, maxBucketSize, maxHeapMemory, maxDirectMemory); server.addBean(rbbp); // make sure the ArrayRetainableByteBufferPool is added before the server is started server.start(); ``` _With jetty-home/jetty-base_ Create a `${jetty.base}/etc/retainable-byte-buffer-config.xml` ``` xml <?xml version="1.0"?> <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN" "https://www.eclipse.org/jetty/configure_10_0.dtd"> <Configure id="Server" class="org.eclipse.jetty.server.Server"> <Call name="addBean"> <Arg> <New class="org.eclipse.jetty.io.ArrayRetainableByteBufferPool"> <Arg type="int"><Property name="jetty.byteBufferPool.minCapacity" default="0"/></Arg> <Arg type="int"><Property name="jetty.byteBufferPool.factor" default="-1"/></Arg> <Arg type="int"><Property name="jetty.byteBufferPool.maxCapacity" default="-1"/></Arg> <Arg type="int"><Property name="jetty.byteBufferPool.maxBucketSize" default="1000"/></Arg> <Arg type="long"><Property name="jetty.byteBufferPool.maxHeapMemory" default="128000000"/></Arg> <Arg type="long"><Property name="jetty.byteBufferPool.maxDirectMemory" default="128000000"/></Arg> </New> </Arg> </Call> </Configure> ``` And then reference it in `${jetty.base}/start.d/retainable-byte-buffer-config.ini` ``` etc/retainable-byte-buffer-config.xml ``` ### References https://github.com/eclipse/jetty.project/issues/8161 ### For more information * Email us at [security@webtide.com](mailto:security@webtide.com) CVE-2022-2191
GHSA-8mpp-f3f7-xc28
VCID-kh4j-dvmk-akaz Uncontrolled Resource Consumption in org.eclipse.jetty:jetty-server In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings. CVE-2018-12545
GHSA-h2f4-v4c4-6wx4
VCID-q54z-9km5-7bf3 In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage for the FileSessionDataStore. CVE-2018-12538
GHSA-mwcx-532g-8pq3
VCID-r725-4tby-87f2 The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x before 9.3.9 on Windows allows remote attackers to bypass protected resource restrictions and other security constraints via a URL with certain escaped characters, related to backslashes. CVE-2016-4800
GHSA-872g-2h8h-362q
VCID-sshg-yscz-afga Eclipse Jetty HTTP/2 client can force the server to allocate a humongous byte buffer that may lead to OoM and subsequently the JVM to exit ### Original Report In Eclipse Jetty versions 12.0.0 to 12.0.16 included, an HTTP/2 client can specify a very large value for the HTTP/2 settings parameter SETTINGS_MAX_HEADER_LIST_SIZE. The Jetty HTTP/2 server does not perform validation on this setting, and tries to allocate a ByteBuffer of the specified capacity to encode HTTP responses, likely resulting in OutOfMemoryError being thrown, or even the JVM process exiting. ### Impact Remote peers can cause the JVM to crash or continuously report OOM. ### Patches 12.0.17 ### Workarounds No workarounds. ### References https://github.com/jetty/jetty.project/issues/12690 CVE-2025-1948
GHSA-889j-63jv-qhr8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:34:49.135572+00:00 Debian Importer Fixing VCID-6uhn-tn81-cyac https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:50.618269+00:00 Debian Importer Fixing VCID-r725-4tby-87f2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:23:48.396427+00:00 Debian Importer Fixing VCID-q54z-9km5-7bf3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:43.575153+00:00 Debian Importer Fixing VCID-kh4j-dvmk-akaz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:44.871499+00:00 Debian Importer Fixing VCID-h3wz-rdkt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:26.583798+00:00 Debian Importer Fixing VCID-sshg-yscz-afga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:36:57.324184+00:00 Debian Importer Fixing VCID-6uhn-tn81-cyac https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:02.208145+00:00 Debian Importer Fixing VCID-r725-4tby-87f2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:25.234227+00:00 Debian Importer Fixing VCID-q54z-9km5-7bf3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:03.284670+00:00 Debian Importer Fixing VCID-kh4j-dvmk-akaz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:38.650168+00:00 Debian Importer Fixing VCID-h3wz-rdkt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:35.163949+00:00 Debian Importer Fixing VCID-sshg-yscz-afga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:51.408444+00:00 Debian Importer Fixing VCID-sshg-yscz-afga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:50.669366+00:00 Debian Importer Fixing VCID-h3wz-rdkt-7ue6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:49.984294+00:00 Debian Importer Fixing VCID-6uhn-tn81-cyac https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:49.893527+00:00 Debian Importer Fixing VCID-kh4j-dvmk-akaz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:49.852565+00:00 Debian Importer Fixing VCID-q54z-9km5-7bf3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:49.563775+00:00 Debian Importer Fixing VCID-r725-4tby-87f2 https://security-tracker.debian.org/tracker/data/json 38.1.0