-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2009:291 http://www.mandriva.com/security/ _______________________________________________________________________ Package : jetty5 Date : October 29, 2009 Affected: 2009.0, 2009.1 _______________________________________________________________________ Problem Description: A vulnerability has been identified and corrected in jetty5: Directory traversal vulnerability in the HTTP server in Mort Bay Jetty before 6.1.17, and 7.0.0.M2 and earlier 7.x versions, allows remote attackers to access arbitrary files via directory traversal sequences in the URI (CVE-2009-1523). This update fixes this vulnerability. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1523 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 0383668f255e58ef23b7a14826b599ad 2009.0/i586/jetty5-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm a25c49131e3bd76bfb5d77ae71e6d4cd 2009.0/i586/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm 18696108b6bf58159691ab9121fd4a5d 2009.0/i586/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm 2f59ece66ab44dc2487748ad28afd073 2009.0/i586/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm a82134c5cda0e03fb88fcd43e9ea7e5e 2009.0/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 60cb1f718ab38af98109f7c217659f9c 2009.0/x86_64/jetty5-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm 7e7f6c24c16742c1ad487e6138d59eda 2009.0/x86_64/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm 1f2d86fa1a8e6c3bb552e93ed859df8b 2009.0/x86_64/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm 3a09429ba206b9a20b52c5305890d10d 2009.0/x86_64/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.0.noarch.rpm a82134c5cda0e03fb88fcd43e9ea7e5e 2009.0/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.0.src.rpm Mandriva Linux 2009.1: edd6d75064239e5b464ce3c8d3bd4f11 2009.1/i586/jetty5-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm bea3de0cfc1a7bc0eaaa49cfc6ccedcd 2009.1/i586/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm 7a8ecc3f64392effa30b9a0d951500e8 2009.1/i586/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm 54be60e18734624c82cd655de0f04348 2009.1/i586/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm 72b1ac196e64288be9e56b06b3244456 2009.1/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.1.src.rpm Mandriva Linux 2009.1/X86_64: c7870c4f26c91cde3336736a60270129 2009.1/x86_64/jetty5-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm ee02ab410a5df20e880ffaa9376dd53c 2009.1/x86_64/jetty5-demo-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm 37481f18658029037994197bcfe6b16a 2009.1/x86_64/jetty5-javadoc-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm c61d5d31d916d8cf29be3793269d79ab 2009.1/x86_64/jetty5-manual-5.1.15-0.1.5.1.1mdv2009.1.noarch.rpm 72b1ac196e64288be9e56b06b3244456 2009.1/SRPMS/jetty5-5.1.15-0.1.5.1.1mdv2009.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFK6ci5mqjQ0CJFipgRAl8kAJ4pNWlsBcFaSFS84Dag8sDKly9ELgCgnw1a djZoHMeblkdE+5RECgQRqNo= =cxEg -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/