Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "jetty",
"binary_version": "6.1.26-1ubuntu1.2"
},
{
"binary_name": "libjetty-extra",
"binary_version": "6.1.26-1ubuntu1.2"
},
{
"binary_name": "libjetty-extra-java",
"binary_version": "6.1.26-1ubuntu1.2"
},
{
"binary_name": "libjetty-java",
"binary_version": "6.1.26-1ubuntu1.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libjetty-extra",
"binary_version": "6.1.26-5ubuntu0.1"
},
{
"binary_name": "libjetty-extra-java",
"binary_version": "6.1.26-5ubuntu0.1"
},
{
"binary_name": "libjetty-java",
"binary_version": "6.1.26-5ubuntu0.1"
}
]
}