The Jetty Project is announcing a critical security release of Jetty







Jetty 9.2.9.v20150224





This release is considered a critical security release for all

users of Jetty 9.2.3 through 9.2.8.





The Highlights:





+ A critical security vulnerability has been fixed with how Jetty

reports 400 Invalid Character responses when the HttpParser

encounters an error.

This 400 response can contain information from past buffer

use from within Jetty. Revealing random buffer contents

from other previously handled requests.





For details see either the bug at





Or the markdown about the vulnerability at





Distribution Downloads:









The artifacts are also available in the Global Central Repository.









Eclipse P2 repositories are available now.





If you find an issue with this release you can open a bug through the

guided bugzilla page located here:









Documentation can be found at our documentation hub









Finally, a reminder that both dev and prod support are offered through

Webtide ( www.webtide.com ), feel free to contact us through that site

or ping me directly if you are interested in learning more.

Documentation PDF's are available for direct download on the





cheers,

The Jetty Development Team





jetty-9.2.9.v20150224 - 24 February 2015

+ 459273 Redundant license notices

+ 460176 When checking for precompiled jsp, ensure classname is present

+ 460180 Jaas demo has wrong doco in html

+ 460291 AsyncGzipFilter Mappings

+ 460371 AsyncMiddleManServlet.GZipContentTransformer fails if last transform

has no output

+ 460372 if web.xml does not contain jspc maven plugin insertionMarker

behavior is wrong

+ 460443 Race condition releasing the response buffer.

+ 460642 HttpParser error 400 can expose previous buffer contents in HTTP

status reason message