[ 
https://issues.apache.org/jira/browse/KAFKA-17807?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Vishal updated KAFKA-17807:
---------------------------
    Description: 
# jetty-http

[https://nvd.nist.gov/vuln/detail/CVE-2024-6763]

Current jetty-http version: 9.4.54.v20240208

Fix versions: 12.0.12
 # jetty-server

jetty-server, is vulnerable to [https://nvd.nist.gov/vuln/detail/CVE-2024-8184]

current jetty-server version: 9.4.54.v20240208

Fix Version : 10.0.24, 11.0.24, 12.0.9, 9.4.56

I created this report after I got an automated notification from a security 
image scanner.

  was:
# jetty-http

[https://nvd.nist.gov/vuln/detail/CVE-2024-6763]

Current jetty-http version: 9.4.54.v20240208

Fix versions: 12.0.12
 # jetty-server

jetty-server, is vulnerable to [https://nvd.nist.gov/vuln/detail/CVE-2024-8184]

current jetty-server version: 9.4.54.v20240208

Fix Version : 10.0.24, 11.0.24, 12.0.9, 9.4.56

I created this report after I got an automated notification from a security 
image scanning.


> Update jetty-http & jetty-server [CVE-2024-6763] [CVE-2024-8184]
> ----------------------------------------------------------------
>
>                 Key: KAFKA-17807
>                 URL: https://issues.apache.org/jira/browse/KAFKA-17807
>             Project: Kafka
>          Issue Type: Bug
>    Affects Versions: 3.9.0
>            Reporter: Vishal
>            Priority: Blocker
>             Fix For: 4.0.0, 3.9.0, 3.8.1
>
>
> # jetty-http
> [https://nvd.nist.gov/vuln/detail/CVE-2024-6763]
> Current jetty-http version: 9.4.54.v20240208
> Fix versions: 12.0.12
>  # jetty-server
> jetty-server, is vulnerable to 
> [https://nvd.nist.gov/vuln/detail/CVE-2024-8184]
> current jetty-server version: 9.4.54.v20240208
> Fix Version : 10.0.24, 11.0.24, 12.0.9, 9.4.56
> I created this report after I got an automated notification from a security 
> image scanner.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to