Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "jetty", "binary_version": "6.1.26-1ubuntu1.2" }, { "binary_name": "libjetty-extra", "binary_version": "6.1.26-1ubuntu1.2" }, { "binary_name": "libjetty-extra-dbgsym", "binary_version": "6.1.26-1ubuntu1.2" }, { "binary_name": "libjetty-extra-java", "binary_version": "6.1.26-1ubuntu1.2" }, { "binary_name": "libjetty-java", "binary_version": "6.1.26-1ubuntu1.2" }, { "binary_name": "libjetty-java-doc", "binary_version": "6.1.26-1ubuntu1.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libjetty-extra", "binary_version": "6.1.26-5ubuntu0.1" }, { "binary_name": "libjetty-extra-dbgsym", "binary_version": "6.1.26-5ubuntu0.1" }, { "binary_name": "libjetty-extra-java", "binary_version": "6.1.26-5ubuntu0.1" }, { "binary_name": "libjetty-java", "binary_version": "6.1.26-5ubuntu0.1" }, { "binary_name": "libjetty-java-doc", "binary_version": "6.1.26-5ubuntu0.1" } ] }