Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
{ "binaries": [ { "binary_name": "jetty9", "binary_version": "9.4.55-1" }, { "binary_name": "libjetty9-extra-java", "binary_version": "9.4.55-1" }, { "binary_name": "libjetty9-java", "binary_version": "9.4.55-1" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "jetty9", "binary_version": "9.4.53-1" }, { "binary_name": "libjetty9-extra-java", "binary_version": "9.4.53-1" }, { "binary_name": "libjetty9-java", "binary_version": "9.4.53-1" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "jetty9", "binary_version": "9.4.56-1" }, { "binary_name": "libjetty9-extra-java", "binary_version": "9.4.56-1" }, { "binary_name": "libjetty9-java", "binary_version": "9.4.56-1" } ], "ubuntu_priority": "medium", "availability": "No subscription required" }