Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jetty9@9.4.35-1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.35-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-nyxu-ekhs-gyb5 Buffer not correctly recycled in Gzip Request inflation ### Impact If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request on the same connection will see that body prepended to it's body. The attacker will not see any data, but may inject data into the body of the subsequent request CVE score is [4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&version=3.1) ### Workarounds The problem can be worked around by either: - Disabling compressed request body inflation by GzipHandler. - By always fully consuming the request content before sending a response. - By adding a `Connection: close` to any response where the servlet does not fully consume request content. CVE-2020-27218
GHSA-86wm-rrjm-8wh8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:32:48.383427+00:00 Debian Importer Fixing VCID-nyxu-ekhs-gyb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:52:14.798378+00:00 Debian Importer Fixing VCID-nyxu-ekhs-gyb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:50.205605+00:00 Debian Importer Fixing VCID-nyxu-ekhs-gyb5 https://security-tracker.debian.org/tracker/data/json 38.1.0