Upgrade Jetty to 9.3.24.v20180605 to fix several CVEs

This upgrade fixes the following CVEs:

- CVE-2017-7656 [1]:

  In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations),
  and 9.4.x (non-default configuration with RFC2616 compliance enabled),
  HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method
  space URI space version) that declares a version of HTTP/0.9 was accepted
  and treated as a 0.9 request. If deployed behind an intermediary that also
  accepted and passed through the 0.9 version (but did not act on it), then
  the response sent could be interpreted by the intermediary as HTTP/1
  headers. This could be used to poison the cache if the server allowed the
  origin client to generate arbitrary content in the response.

- CVE-2017-7657 [2]:

  In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and
  9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-
  encoding chunks are handled poorly. The chunk length parsing was vulnerable
  to an integer overflow. Thus a large chunk size could be interpreted as a
  smaller chunk size and content sent as chunk body could be interpreted as a
  pipelined request. If Jetty was deployed behind an intermediary that imposed
  some authorization and that intermediary allowed arbitrarily large chunks to
  be passed on unchanged, then this flaw could be used to bypass the
  authorization imposed by the intermediary as the fake pipelined request would
  not be interpreted by the intermediary as a request.

- CVE-2017-7658 [3]:

  In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x
  configurations), and 9.4.x (all HTTP/1.x configurations), when presented with
  two content-length headers, Jetty ignored the second. When presented with a
  content-length and a chunked encoding header, the content-length was ignored
  (as per RFC 2616). If an intermediary decided on the shorter length, but still
  passed on the longer body, then body content could be interpreted by Jetty as
  a pipelined request. If the intermediary was imposing authorization, the fake
  pipelined request would bypass that authorization.

- CVE-2017-9735 [4]:

  Jetty through 9.4.x is prone to a timing channel in util/security/Password.java,
  which makes it easier for remote attackers to obtain access by observing
  elapsed times before rejection of incorrect passwords.

- CVE-2018-12536 [5]:

  In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default
  Error Handling, when an intentionally bad query arrives that doesn't match a
  dynamic url-pattern, and is eventually handled by the DefaultServlet's static
  file serving, the bad characters can trigger a
  java.nio.file.InvalidPathException which includes the full path to the base
  resource directory that the DefaultServlet and/or webapp is using. If this
  InvalidPathException is then handled by the default Error Handler, the
  InvalidPathException message is included in the error response, revealing the
  full server path to the requesting system.

[1] https://nvd.nist.gov/vuln/detail/CVE-2017-7656
[2] https://nvd.nist.gov/vuln/detail/CVE-2017-7657
[3] https://nvd.nist.gov/vuln/detail/CVE-2017-7658
[4] https://nvd.nist.gov/vuln/detail/CVE-2017-9735
[5] https://nvd.nist.gov/vuln/detail/CVE-2018-12536

Bug: Issue 9952
Change-Id: I1ebb91406b88289e3803ffb1d5049ea7352c695c
1 file changed
tree: 6d4905665e8e89bfcfb9f9e0093dfbbac92cd2a9
  1. .settings/
  2. contrib/
  3. Documentation/
  4. gerrit-acceptance-framework/
  5. gerrit-acceptance-tests/
  6. gerrit-antlr/
  7. gerrit-cache-h2/
  8. gerrit-cache-mem/
  9. gerrit-common/
  10. gerrit-elasticsearch/
  11. gerrit-extension-api/
  12. gerrit-gpg/
  13. gerrit-gwtdebug/
  14. gerrit-gwtexpui/
  15. gerrit-gwtui/
  16. gerrit-gwtui-common/
  17. gerrit-httpd/
  18. gerrit-launcher/
  19. gerrit-lucene/
  20. gerrit-main/
  21. gerrit-oauth/
  22. gerrit-openid/
  23. gerrit-patch-commonsnet/
  24. gerrit-patch-jgit/
  25. gerrit-pgm/
  26. gerrit-plugin-api/
  27. gerrit-plugin-gwtui/
  28. gerrit-prettify/
  29. gerrit-reviewdb/
  30. gerrit-server/
  31. gerrit-sshd/
  32. gerrit-test-util/
  33. gerrit-util-cli/
  34. gerrit-util-http/
  35. gerrit-util-ssl/
  36. gerrit-war/
  37. lib/
  38. plugins/
  39. polygerrit-ui/
  40. ReleaseNotes/
  41. tools/
  42. website/
  43. .bazelproject
  44. .bazelrc
  45. .editorconfig
  46. .git-blame-ignore-revs
  47. .gitignore
  48. .gitmodules
  49. .mailmap
  50. .pydevproject
  51. 0001-Replace-native-http-git-_archive-with-Skylark-rules.patch
  52. BUILD
  53. COPYING
  54. INSTALL
  55. README.md
  56. SUBMITTING_PATCHES
  57. version.bzl
  58. WORKSPACE
README.md

Gerrit Code Review

Gerrit is a code review and project management tool for Git based projects.

Build Status

Objective

Gerrit makes reviews easier by showing changes in a side-by-side display, and allowing inline comments to be added by any reviewer.

Gerrit simplifies Git based project maintainership by permitting any authorized user to submit changes to the master Git repository, rather than requiring all approved changes to be merged in by hand by the project maintainer.

Documentation

For information about how to install and use Gerrit, refer to the documentation.

Source

Our canonical Git repository is located on googlesource.com. There is a mirror of the repository on Github.

Reporting bugs

Please report bugs on the issue tracker.

Contribute

Gerrit is the work of hundreds of contributors. We appreciate your help!

Please read the contribution guidelines.

Note that we do not accept Pull Requests via the Github mirror.

Getting in contact

The IRC channel on freenode is #gerrit. An archive is available at: echelog.com.

The Developer Mailing list is repo-discuss on Google Groups.

License

Gerrit is provided under the Apache License 2.0.

Build

Install Bazel and run the following:

    git clone --recursive https://gerrit.googlesource.com/gerrit
    cd gerrit && bazel build release

Install binary packages (Deb/Rpm)

The instruction how to configure GerritForge/BinTray repositories is here

On Debian/Ubuntu run:

    apt-get update & apt-get install gerrit=<version>-<release>

NOTE: release is a counter that starts with 1 and indicates the number of packages that have been released with the same version of the software.

On CentOS/RedHat run:

    yum clean all && yum install gerrit-<version>[-<release>]

On Fedora run:

    dnf clean all && dnf install gerrit-<version>[-<release>]

Use pre-built Gerrit images on Docker

Docker images of Gerrit are available on DockerHub

To run a CentOS 7 based Gerrit image:

    docker run -p 8080:8080 gerritforge/gerrit-centos7[:version]

To run a Ubuntu 15.04 based Gerrit image:

    docker run -p 8080:8080 gerritforge/gerrit-ubuntu15.04[:version]

NOTE: release is optional. Last released package of the version is installed if the release number is omitted.