drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in Jetty
Name: |
Preisgabe von Informationen in Jetty |
|
ID: |
FEDORA-2017-4e2312892e |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 26 |
|
Datum: |
Sa, 8. Juli 2017, 11:57 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9735 |
|
Applikationen: |
Jetty |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2017-4e2312892e 2017-07-07 22:40:59.828220 ------------------------------------------------------------------------------- -
Name : jetty Product : Fedora 26 Version : 9.4.6 Release : 1.v20170531.fc26 URL : http://www.eclipse.org/jetty/ Summary : Java Webserver and Servlet Container Description :
Jetty is a 100% Java HTTP Server and Servlet Container. This means that you do not need to configure and run a separate web server (like Apache) in order to use Java, servlets and JSPs to generate dynamic content. Jetty is a fully featured web server for static and dynamic content. Unlike separate server/container solutions, this means that your web server and web application run in the same process, without interconnection overheads and complications. Furthermore, as a pure java component, Jetty can be simply included in your application for demonstration, distribution or deployment. Jetty is available on all Java supported platforms.
------------------------------------------------------------------------------- - Update Information:
Update to latest upstream release in order to fix CVE-2017-9735 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1464158 - CVE-2017-9735 jetty: Timing channel attack in util/security/Password.java https://bugzilla.redhat.com/show_bug.cgi?id=1464158 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade jetty' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
|
|
|
|