Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jetty9@9.4.54-1?distro=trixie
purl pkg:deb/debian/jetty9@9.4.54-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-1ejr-3tea-kydr Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks ### Impact Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory. ### Patches * https://github.com/jetty/jetty.project/pull/9715 * https://github.com/jetty/jetty.project/pull/9716 ### Workarounds The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by: + not using the PushCacheFilter. Push has been deprecated by the various IETF specs and early hints responses should be used instead. + reducing the reducing the idle timeout on unauthenticated sessions will reduce the time such session stay in memory. + configuring a session cache to use [session passivation](https://jetty.org/docs/jetty/12/programming-guide/server/session.html), so that sessions are not stored in memory, but rather in a database or file system that may have significantly more capacity than memory. ### References * https://github.com/jetty/jetty.project/pull/10756 * https://github.com/jetty/jetty.project/pull/10755 CVE-2024-6762
GHSA-r7m4-f9h5-gr79
VCID-5qhm-ase5-5qhy Connection leaking on idle timeout when TCP congested ### Impact If an HTTP/2 connection gets TCP congested, when an idle timeout occurs the HTTP/2 session is marked as closed, and then a GOAWAY frame is queued to be written. However it is not written because the connection is TCP congested. When another idle timeout period elapses, it is then supposed to hard close the connection, but it delegates to the HTTP/2 session which reports that it has already been closed so it does not attempt to hard close the connection. This leaves the connection in ESTABLISHED state (i.e. not closed), TCP congested, and idle. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The client may also be impacted (if the server does not read causing a TCP congestion), but the issue is more severe for servers. ### Patches Patched versions: * 9.4.54 * 10.0.20 * 11.0.20 * 12.0.6 ### Workarounds Disable HTTP/2 and HTTP/3 support until you can upgrade to a patched version of Jetty. HTTP/1.x is not affected. ### References * https://github.com/jetty/jetty.project/issues/11256. CVE-2024-22201
GHSA-rggv-cv7r-mw98
VCID-memq-11qz-9qem Eclipse Jetty has a denial of service vulnerability on DosFilter Description There exists a security vulnerability in Jetty's DosFilter which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack on the server using DosFilter. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory finally. Vulnerability details The Jetty DoSFilter (Denial of Service Filter) is a security filter designed to protect web applications against certain types of Denial of Service (DoS) attacks and other abusive behavior. It helps to mitigate excessive resource consumption by limiting the rate at which clients can make requests to the server. The DoSFilter monitors and tracks client request patterns, including request rates, and can take actions such as blocking or delaying requests from clients that exceed predefined thresholds. The internal tracking of requests in DoSFilter is the source of this OutOfMemory condition. Impact Users of the DoSFilter may be subject to DoS attacks that will ultimately exhaust the memory of the server if they have not configured session passivation or an aggressive session inactivation timeout. Patches The DoSFilter has been patched in all active releases to no longer support the session tracking mode, even if configured. Patched releases: * 9.4.54 * 10.0.18 * 11.0.18 * 12.0.3 CVE-2024-9823
GHSA-j26w-f9rq-mr2q

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:58:07.354090+00:00 Debian Importer Fixing VCID-memq-11qz-9qem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:48.123342+00:00 Debian Importer Fixing VCID-1ejr-3tea-kydr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:04:19.879057+00:00 Debian Importer Fixing VCID-5qhm-ase5-5qhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:54:31.062835+00:00 Debian Importer Fixing VCID-memq-11qz-9qem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:43.930927+00:00 Debian Importer Fixing VCID-1ejr-3tea-kydr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:45:28.941796+00:00 Debian Importer Fixing VCID-5qhm-ase5-5qhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:51.371835+00:00 Debian Importer Fixing VCID-memq-11qz-9qem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:51.248018+00:00 Debian Importer Fixing VCID-1ejr-3tea-kydr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:51.182936+00:00 Debian Importer Fixing VCID-5qhm-ase5-5qhy https://security-tracker.debian.org/tracker/data/json 38.1.0