{"id":"MGASA-2017-0277","summary":"Updated jetty packages fix security vulnerability","details":"Jetty is prone to a timing channel attack in util/security/Password.java, which\nmakes it easier for remote attackers to obtain access by observing elapsed times\nbefore rejection of incorrect passwords (CVE-2017-9735).\n","modified":"2026-01-31T12:00:35.009885Z","published":"2017-08-18T17:06:49Z","related":["CVE-2017-9735"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0277.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21202"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QULQK5DU63QRYEWLVC6QZWASFQFSPFMD/"}],"affected":[{"package":{"name":"jetty","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/jetty?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.4.6-1.v20170531.1.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0277.json"}},{"package":{"name":"jetty-alpn","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/jetty-alpn?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.1.11-3.v20170118.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0277.json"}},{"package":{"name":"jetty-test-helper","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/jetty-test-helper?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1-4.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0277.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}