Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade Jetty from 9.4.14.v20181114 to 9.4.54.v20240208 to Address Security Vulnerabilities #86

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

siddhuoo7
Copy link

@siddhuoo7 siddhuoo7 commented May 28, 2024

Summary

This pull request upgrades the Jetty server dependency from version 9.4.14.v20181114 to 9.4.54.v20240208. This update addresses several known security vulnerabilities and includes numerous improvements and bug fixes.

Details

  • Current Version: 9.4.14.v20181114
  • New Version: 9.4.54.v20240208

Vulnerabilities Addressed

Upgrading to Jetty 9.4.53.v20231009 addresses multiple security vulnerabilities, including but not limited to:

Improvements and Bug Fixes

In addition to security fixes, this upgrade includes several performance improvements and bug fixes. Notable changes are:

  • Enhanced WebSocket handling
  • Improved HTTP/2 support and stability
  • Better compliance with HTTP standards
  • Various memory leak fixes
  • Performance optimizations and reduced CPU usage under high load

Testing

Thorough testing has been conducted to ensure compatibility and stability with our existing application. Tests include:

  • Unit tests
  • Integration tests

@siddhuoo7 siddhuoo7 requested a review from a team as a code owner May 28, 2024 02:29
@siddhuoo7 siddhuoo7 requested a review from presto-oss May 28, 2024 02:29
Copy link

linux-foundation-easycla bot commented May 28, 2024

CLA Signed

The committers listed above are authorized under a signed CLA.

@siddhuoo7 siddhuoo7 changed the title Upgrade Jetty from 9.4.14.v20181114 to 9.4.53.v20231009 to Address Security Vulnerabilities Upgrade Jetty from 9.4.14.v20181114 to 9.4.54.v20240208 to Address Security Vulnerabilities Jun 4, 2024
Comment on lines +365 to +371
return null;
}

@Override
public Object getTag()
{
return null;

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
return null;
}
@Override
public Object getTag()
{
return null;
throw new UnsupportedOperationException();
}
@Override
public Object getTag()
{
throw new UnsupportedOperationException();

@@ -638,7 +639,7 @@ public void testResponseStatusMessage()
assertNull(statusMessage);
}
else {
assertEquals(statusMessage, "message");
assertEquals(statusMessage, "OK");

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -747,7 +748,7 @@ public void testCompressionIsDisabled()
assertEquals(body, "");
assertFalse(servlet.getRequestHeaders().containsKey(HeaderName.of(ACCEPT_ENCODING)));

String json = "{\"foo\":\"bar\",\"hello\":\"world\"}";
String json = "{\"fuite\":\"apple\",\"hello\":\"world\"}";

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this change needed?

@tdcmeehan
Copy link

@siddhuoo7 are you still working on this PR?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants