DEBIAN-CVE-2025-5115

Source
https://security-tracker.debian.org/tracker/CVE-2025-5115
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-5115.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-5115
Upstream
Published
2025-08-20T20:15:33Z
Modified
2025-09-30T05:20:47.273880Z
Summary
[none]
Details

In Eclipse Jetty, versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2, an HTTP/2 client may trigger the server to send RSTSTREAM frames, for example by sending frames that are malformed or that should not be sent in a particular stream state, therefore forcing the server to consume resources such as CPU and memory. For example, a client can open a stream and then send WINDOWUPDATE frames with window size increment of 0, which is illegal. Per specification https://www.rfc-editor.org/rfc/rfc9113.html#name-windowupdate , the server should send a RSTSTREAM frame. The client can now open another stream and send another bad WINDOWUPDATE, therefore causing the server to consume more resources than necessary, as this case does not exceed the max number of concurrent streams, yet the client is able to create an enormous amount of streams in a short period of time. The attack can be performed with other conditions (for example, a DATA frame for a closed stream) that cause the server to send a RSTSTREAM frame. Links: * https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h

References

Affected packages

Debian:11

jetty9

Package

Name
jetty9
Purl
pkg:deb/debian/jetty9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.4.57-0+deb11u3

Affected versions

9.*

9.4.39-3
9.4.39-3+deb11u1
9.4.39-3+deb11u2
9.4.44-1
9.4.44-2
9.4.44-3
9.4.44-4
9.4.45-1
9.4.46-1
9.4.48-1
9.4.49-1
9.4.49-1.1
9.4.50-1~bpo11+1
9.4.50-1
9.4.50-2
9.4.50-3
9.4.50-4
9.4.50-4+deb11u1
9.4.50-4+deb11u2
9.4.51-1
9.4.51-2
9.4.52-1
9.4.53-1
9.4.54-1
9.4.55-1
9.4.56-1
9.4.57-0+deb11u1
9.4.57-0+deb11u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12

jetty9

Package

Name
jetty9
Purl
pkg:deb/debian/jetty9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.4.57-1.1~deb12u1

Affected versions

9.*

9.4.50-4
9.4.50-4+deb12u1
9.4.50-4+deb12u2
9.4.50-4+deb12u3
9.4.51-1
9.4.51-2
9.4.52-1
9.4.53-1
9.4.54-1
9.4.55-1
9.4.56-1
9.4.57-0+deb12u1
9.4.57-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13

jetty12

Package

Name
jetty12
Purl
pkg:deb/debian/jetty12?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.0.17-3.1~deb13u1

Affected versions

12.*

12.0.17-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

jetty9

Package

Name
jetty9
Purl
pkg:deb/debian/jetty9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.4.57-1.1~deb13u1

Affected versions

9.*

9.4.57-1
9.4.57-1.1~deb12u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14

jetty12

Package

Name
jetty12
Purl
pkg:deb/debian/jetty12?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
12.0.17-3.1

Affected versions

12.*

12.0.17-3
12.0.17-3.1~deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

jetty9

Package

Name
jetty9
Purl
pkg:deb/debian/jetty9?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.4.57-1.1

Affected versions

9.*

9.4.57-1
9.4.57-1.1~deb12u1
9.4.57-1.1~deb13u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}