Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-2048 (GCVE-0-2022-2048)
Vulnerability from cvelistv5 – Published: 2022-07-07 20:35 – Updated: 2024-08-03 00:24| URL | Tags |
|---|---|
| https://github.com/eclipse/jetty.project/security… | x_refsource_CONFIRM |
| https://www.debian.org/security/2022/dsa-5198 | vendor-advisoryx_refsource_DEBIAN |
| https://lists.debian.org/debian-lts-announce/2022… | mailing-listx_refsource_MLIST |
| https://security.netapp.com/advisory/ntap-2022090… | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2022/09/09/2 | mailing-listx_refsource_MLIST |
| Vendor | Product | Version | |
|---|---|---|---|
| The Eclipse Foundation | Eclipse Jetty |
Affected:
9.4.0 , < unspecified
(custom)
Affected: unspecified , ≤ 9.4.46 (custom) Affected: 10.0.0 , < unspecified (custom) Affected: unspecified , ≤ 10.0.9 (custom) Affected: 11.0.0 , < unspecified (custom) Affected: unspecified , ≤ 11.0.9 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:24:43.964Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"name": "DSA-5198",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"name": "[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"name": "[oss-security] 20220909 Vulnerability in Jenkins",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Eclipse Jetty",
"vendor": "The Eclipse Foundation",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "9.4.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.4.46",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "10.0.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "11.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "11.0.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-410",
"description": "CWE-410",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-664",
"description": "CWE-664",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-09T14:06:11.000Z",
"orgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
"shortName": "eclipse"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"name": "DSA-5198",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"name": "[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"name": "[oss-security] 20220909 Vulnerability in Jenkins",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@eclipse.org",
"ID": "CVE-2022-2048",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Eclipse Jetty",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "9.4.0"
},
{
"version_affected": "\u003c=",
"version_value": "9.4.46"
},
{
"version_affected": "\u003e=",
"version_value": "10.0.0"
},
{
"version_affected": "\u003c=",
"version_value": "10.0.9"
},
{
"version_affected": "\u003e=",
"version_value": "11.0.0"
},
{
"version_affected": "\u003c=",
"version_value": "11.0.9"
}
]
}
}
]
},
"vendor_name": "The Eclipse Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-410"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-664"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j",
"refsource": "CONFIRM",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"name": "DSA-5198",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"name": "[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220901-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"name": "[oss-security] 20220909 Vulnerability in Jenkins",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "e51fbebd-6053-4e49-959f-1b94eeb69a2c",
"assignerShortName": "eclipse",
"cveId": "CVE-2022-2048",
"datePublished": "2022-07-07T20:35:09.000Z",
"dateReserved": "2022-06-09T00:00:00.000Z",
"dateUpdated": "2024-08-03T00:24:43.964Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-2048",
"date": "2026-05-19",
"epss": "0.00668",
"percentile": "0.71519"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.4.47\", \"matchCriteriaId\": \"A055068C-4D71-4DDD-AEFF-E39982FD8DC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndExcluding\": \"10.0.9\", \"matchCriteriaId\": \"DB90B12D-86AF-4A9F-8C44-0213FA056919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndExcluding\": \"11.0.9\", \"matchCriteriaId\": \"FC65CE45-D006-4A65-81EA-B7D0397DCA2B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"214712B6-59AF-4B5E-84BF-AF3C74A390EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire_\\\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D452B464-1200-4B72-9A89-42DC58486191\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.263\", \"matchCriteriaId\": \"FB750FC4-A7B8-464B-9CF1-02BAC0A5121B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*\", \"versionEndExcluding\": \"2.361.1\", \"matchCriteriaId\": \"F1570EF2-F7AD-4D7A-B13C-5F729E218E0F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.\"}, {\"lang\": \"es\", \"value\": \"En la implementaci\\u00f3n del servidor Eclipse Jetty HTTP/2, cuando es encontrada una petici\\u00f3n HTTP/2 no v\\u00e1lida, el manejo de errores presenta un error que puede terminar por no limpiar apropiadamente las conexiones activas y los recursos asociados. Esto puede conllevar a un escenario de denegaci\\u00f3n de servicio en el que no queden recursos suficientes para procesar las peticiones buenas\"}]",
"id": "CVE-2022-2048",
"lastModified": "2024-11-21T07:00:13.980",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"emo@eclipse.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-07-07T21:15:10.150",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/09/2\", \"source\": \"emo@eclipse.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\", \"source\": \"emo@eclipse.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html\", \"source\": \"emo@eclipse.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220901-0006/\", \"source\": \"emo@eclipse.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5198\", \"source\": \"emo@eclipse.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/09/09/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20220901-0006/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2022/dsa-5198\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "emo@eclipse.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"emo@eclipse.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-410\"}, {\"lang\": \"en\", \"value\": \"CWE-664\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-2048\",\"sourceIdentifier\":\"emo@eclipse.org\",\"published\":\"2022-07-07T21:15:10.150\",\"lastModified\":\"2024-11-21T07:00:13.980\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.\"},{\"lang\":\"es\",\"value\":\"En la implementaci\u00f3n del servidor Eclipse Jetty HTTP/2, cuando es encontrada una petici\u00f3n HTTP/2 no v\u00e1lida, el manejo de errores presenta un error que puede terminar por no limpiar apropiadamente las conexiones activas y los recursos asociados. Esto puede conllevar a un escenario de denegaci\u00f3n de servicio en el que no queden recursos suficientes para procesar las peticiones buenas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"emo@eclipse.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-410\"},{\"lang\":\"en\",\"value\":\"CWE-664\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.4.47\",\"matchCriteriaId\":\"A055068C-4D71-4DDD-AEFF-E39982FD8DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.0.9\",\"matchCriteriaId\":\"DB90B12D-86AF-4A9F-8C44-0213FA056919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.0.9\",\"matchCriteriaId\":\"FC65CE45-D006-4A65-81EA-B7D0397DCA2B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214712B6-59AF-4B5E-84BF-AF3C74A390EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452B464-1200-4B72-9A89-42DC58486191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.263\",\"matchCriteriaId\":\"FB750FC4-A7B8-464B-9CF1-02BAC0A5121B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*\",\"versionEndExcluding\":\"2.361.1\",\"matchCriteriaId\":\"F1570EF2-F7AD-4D7A-B13C-5F729E218E0F\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/09/2\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220901-0006/\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5198\",\"source\":\"emo@eclipse.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/09/09/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220901-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5 ant\u00e9rieures \u00e0 7.5.0 Update Pack 3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.4 ant\u00e9rieures \u00e0 7.4.3 Fix Pack 7",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2021-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38185"
},
{
"name": "CVE-2022-25169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25169"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-33879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33879"
},
{
"name": "CVE-2021-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3634"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831853 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831853"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831855 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831855"
}
]
}
CERTFR-2023-AVI-0357
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Cognos. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Command Center version 10.2.4.1 sans le correctif de s\u00e9curit\u00e9 IF17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27223"
},
{
"name": "CVE-2020-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27218"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-420004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-420004"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2017-7658",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7658"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2018-12545",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12545"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2017-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7657"
},
{
"name": "CVE-2018-12536",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12536"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-2191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2191"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2022-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38707"
},
{
"name": "CVE-2019-10241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10241"
},
{
"name": "CVE-2019-10247",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10247"
},
{
"name": "CVE-2017-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7656"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2021-34428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34428"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0357",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Cognos.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Cognos",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6988263 du 04 mai 2023",
"url": "https://www.ibm.com/support/pages/node/6988263"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6983274 du 04 mai 2023",
"url": "https://www.ibm.com/support/pages/node/6983274"
}
]
}
CERTFR-2022-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5 ant\u00e9rieures \u00e0 7.5.0 Update Pack 3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.4 ant\u00e9rieures \u00e0 7.4.3 Fix Pack 7",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2021-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38185"
},
{
"name": "CVE-2022-25169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25169"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-33879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33879"
},
{
"name": "CVE-2021-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3634"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831853 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831853"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831855 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831855"
}
]
}
CERTFR-2023-AVI-0357
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM Cognos. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Command Center version 10.2.4.1 sans le correctif de s\u00e9curit\u00e9 IF17",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-27223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27223"
},
{
"name": "CVE-2020-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27218"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2021-28169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28169"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-420004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-420004"
},
{
"name": "CVE-2022-31160",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31160"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2021-28165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28165"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2017-7658",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7658"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2018-12545",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12545"
},
{
"name": "CVE-2022-21449",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21449"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2017-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7657"
},
{
"name": "CVE-2018-12536",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12536"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2022-2191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2191"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2022-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38707"
},
{
"name": "CVE-2019-10241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10241"
},
{
"name": "CVE-2019-10247",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10247"
},
{
"name": "CVE-2017-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7656"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2021-34428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34428"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0357",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Cognos.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM Cognos",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6988263 du 04 mai 2023",
"url": "https://www.ibm.com/support/pages/node/6988263"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6983274 du 04 mai 2023",
"url": "https://www.ibm.com/support/pages/node/6983274"
}
]
}
BDU:2023-05681
Vulnerability from fstec - Published: 07.07.2022{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Eclipse Foundation, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "3.11 (OpenShift Container Platform), 7 (Jboss Fuse), 10 (Debian GNU/Linux), 13.0 (Queens) (Red Hat OpenStack Platform), 7 (JBoss A-MQ), 11 (Debian GNU/Linux), 4.8 (OpenShift Container Platform), 4.9 (OpenShift Container Platform), \u043e\u0442 10.0.0 \u0434\u043e 10.0.9 (Jetty), - (Red Hat JBoss A-MQ Streams), \u0434\u043e 2.8 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u043e\u0442 11.0.0 \u0434\u043e 11.0.9 (Jetty), \u0434\u043e 9.4.47 (Jetty), 4.11 (OpenShift Developer Tools and Services for OCP)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Eclipse Jetty:\nhttps://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\nhttps://github.com/eclipse/jetty.project/issues/7935\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-2048\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2022-2048\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f jetty9 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 9.4.39+repack-3+deb11u1osnova1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.07.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.01.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.09.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-05681",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-2048",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "OpenShift Container Platform, Jboss Fuse, Debian GNU/Linux, Red Hat OpenStack Platform, JBoss A-MQ, Jetty, Red Hat JBoss A-MQ Streams, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), OpenShift Developer Tools and Services for OCP",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u043e\u0432 Eclipse Jetty, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u0439 \u043e\u0431\u044a\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-410), \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0432 \u043f\u0435\u0440\u0438\u043e\u0434 \u0435\u0433\u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f (CWE-664)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u0430 \u0441\u0435\u0440\u0432\u043b\u0435\u0442\u043e\u0432 Eclipse Jetty \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e , \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j\nhttps://github.com/eclipse/jetty.project/issues/7935\nhttps://security-tracker.debian.org/tracker/CVE-2022-2048\nhttps://access.redhat.com/security/cve/CVE-2022-2048\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.8/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-410, CWE-664",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
bit-jenkins-2022-2048
Vulnerability from bitnami_vulndb
In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "jenkins",
"purl": "pkg:bitnami/jenkins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.361.1"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2022-2048"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"id": "BIT-jenkins-2022-2048",
"modified": "2025-04-03T14:40:37.652Z",
"published": "2024-03-06T10:58:27.765Z",
"references": [
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
},
{
"type": "WEB",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2048"
}
],
"schema_version": "1.5.0"
}
FKIE_CVE-2022-2048
Vulnerability from fkie_nvd - Published: 2022-07-07 21:15 - Updated: 2024-11-21 07:007.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| eclipse | jetty | * | |
| eclipse | jetty | * | |
| eclipse | jetty | * | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 | |
| netapp | element_plug-in_for_vcenter_server | - | |
| netapp | management_services_for_element_software_and_netapp_hci | - | |
| netapp | snapcenter | - | |
| netapp | solidfire_\&_hci_storage_node | - | |
| netapp | hci_compute_node | - | |
| jenkins | jenkins | * | |
| jenkins | jenkins | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A055068C-4D71-4DDD-AEFF-E39982FD8DC7",
"versionEndExcluding": "9.4.47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB90B12D-86AF-4A9F-8C44-0213FA056919",
"versionEndExcluding": "10.0.9",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC65CE45-D006-4A65-81EA-B7D0397DCA2B",
"versionEndExcluding": "11.0.9",
"versionStartIncluding": "11.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*",
"matchCriteriaId": "214712B6-59AF-4B5E-84BF-AF3C74A390EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB750FC4-A7B8-464B-9CF1-02BAC0A5121B",
"versionEndExcluding": "2.263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"matchCriteriaId": "F1570EF2-F7AD-4D7A-B13C-5F729E218E0F",
"versionEndExcluding": "2.361.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests."
},
{
"lang": "es",
"value": "En la implementaci\u00f3n del servidor Eclipse Jetty HTTP/2, cuando es encontrada una petici\u00f3n HTTP/2 no v\u00e1lida, el manejo de errores presenta un error que puede terminar por no limpiar apropiadamente las conexiones activas y los recursos asociados. Esto puede conllevar a un escenario de denegaci\u00f3n de servicio en el que no queden recursos suficientes para procesar las peticiones buenas"
}
],
"id": "CVE-2022-2048",
"lastModified": "2024-11-21T07:00:13.980",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "emo@eclipse.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-07T21:15:10.150",
"references": [
{
"source": "emo@eclipse.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
},
{
"source": "emo@eclipse.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"source": "emo@eclipse.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"source": "emo@eclipse.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"source": "emo@eclipse.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5198"
}
],
"sourceIdentifier": "emo@eclipse.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-410"
},
{
"lang": "en",
"value": "CWE-664"
}
],
"source": "emo@eclipse.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-WGMR-MF83-7X4J
Vulnerability from github – Published: 2022-07-07 20:55 – Updated: 2022-07-19 19:42Description
Invalid HTTP/2 requests (for example, invalid URIs) are incorrectly handled by writing a blocking error response directly from the selector thread. If the client manages to exhaust the HTTP/2 flow control window, or TCP congest the connection, the selector thread will be blocked trying to write the error response. If this is repeated for all the selector threads, the server becomes unresponsive, causing the denial of service.
Impact
A malicious client may render the server unresponsive.
Patches
The fix is available in Jetty versions 9.4.47. 10.0.10, 11.0.10.
Workarounds
No workaround available within Jetty itself. One possible workaround is to filter the requests before sending them to Jetty (for example in a proxy)
For more information
If you have any questions or comments about this advisory: * Email us at security@webtide.com.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.eclipse.jetty.http2:http2-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "9.4.47"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.eclipse.jetty.http2:http2-server"
},
"ranges": [
{
"events": [
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.eclipse.jetty.http2:http2-server"
},
"ranges": [
{
"events": [
{
"introduced": "11.0.0"
},
{
"fixed": "11.0.10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-2048"
],
"database_specific": {
"cwe_ids": [
"CWE-400",
"CWE-410"
],
"github_reviewed": true,
"github_reviewed_at": "2022-07-07T20:55:40Z",
"nvd_published_at": "2022-07-07T21:15:00Z",
"severity": "HIGH"
},
"details": "### Description\nInvalid HTTP/2 requests (for example, invalid URIs) are incorrectly handled by writing a blocking error response directly from the selector thread.\nIf the client manages to exhaust the HTTP/2 flow control window, or TCP congest the connection, the selector thread will be blocked trying to write the error response.\nIf this is repeated for all the selector threads, the server becomes unresponsive, causing the denial of service.\n\n### Impact\nA malicious client may render the server unresponsive.\n\n### Patches\nThe fix is available in Jetty versions 9.4.47. 10.0.10, 11.0.10.\n\n### Workarounds\nNo workaround available within Jetty itself.\nOne possible workaround is to filter the requests before sending them to Jetty (for example in a proxy)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Email us at security@webtide.com.\n",
"id": "GHSA-wgmr-mf83-7x4j",
"modified": "2022-07-19T19:42:51Z",
"published": "2022-07-07T20:55:40Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2048"
},
{
"type": "PACKAGE",
"url": "https://github.com/eclipse/jetty.project"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20220901-0006"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Jetty vulnerable to Invalid HTTP/2 requests that can lead to denial of service"
}
GSD-2022-2048
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-2048",
"description": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"id": "GSD-2022-2048",
"references": [
"https://www.suse.com/security/cve/CVE-2022-2048.html",
"https://www.debian.org/security/2022/dsa-5198",
"https://access.redhat.com/errata/RHSA-2022:8652",
"https://access.redhat.com/errata/RHSA-2023:0017",
"https://access.redhat.com/errata/RHSA-2023:0189",
"https://access.redhat.com/errata/RHSA-2023:0777"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-2048"
],
"details": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"id": "GSD-2022-2048",
"modified": "2023-12-13T01:19:19.598476Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@eclipse.org",
"ID": "CVE-2022-2048",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Eclipse Jetty",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "9.4.0"
},
{
"version_affected": "\u003c=",
"version_value": "9.4.46"
},
{
"version_affected": "\u003e=",
"version_value": "10.0.0"
},
{
"version_affected": "\u003c=",
"version_value": "10.0.9"
},
{
"version_affected": "\u003e=",
"version_value": "11.0.0"
},
{
"version_affected": "\u003c=",
"version_value": "11.0.9"
}
]
}
}
]
},
"vendor_name": "The Eclipse Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-410"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-664"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j",
"refsource": "CONFIRM",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"name": "DSA-5198",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"name": "[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220901-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"name": "[oss-security] 20220909 Vulnerability in Jenkins",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,9.4.47),[10.0.0,10.0.10),[11.0.0,11.0.10)",
"affected_versions": "All versions before 9.4.47, all versions starting from 10.0.0 before 10.0.10, all versions starting from 11.0.0 before 11.0.10",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-400",
"CWE-937"
],
"date": "2022-07-19",
"description": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"fixed_versions": [
"9.4.47",
"10.0.10",
"11.0.10"
],
"identifier": "CVE-2022-2048",
"identifiers": [
"GHSA-wgmr-mf83-7x4j",
"CVE-2022-2048"
],
"not_impacted": "All versions starting from 9.4.47 before 10.0.0, all versions starting from 10.0.10 before 11.0.0, all versions starting from 11.0.10",
"package_slug": "maven/org.eclipse.jetty.http2/http2-server",
"pubdate": "2022-07-07",
"solution": "Upgrade to versions 9.4.47, 10.0.10, 11.0.10 or above.",
"title": "Uncontrolled Resource Consumption",
"urls": [
"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j",
"https://nvd.nist.gov/vuln/detail/CVE-2022-2048",
"https://github.com/advisories/GHSA-wgmr-mf83-7x4j"
],
"uuid": "0dc5d816-0e91-4815-8ba3-e6081ace386d"
},
{
"affected_range": "[2.263,2.361.1)",
"affected_versions": "All versions after 2.263 before 2.361.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2023-07-24",
"description": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"fixed_versions": [
"2.361.1"
],
"identifier": "CVE-2022-2048",
"identifiers": [
"CVE-2022-2048",
"GHSA-wgmr-mf83-7x4j"
],
"not_impacted": "",
"package_slug": "maven/org.jenkins-ci.main/jenkins-core",
"pubdate": "2022-07-07",
"solution": "Upgrade to version 2.361.1 or above.",
"title": "Uncontrolled Resource Consumption",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-2048",
"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j",
"https://www.debian.org/security/2022/dsa-5198",
"https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html",
"https://security.netapp.com/advisory/ntap-20220901-0006/",
"http://www.openwall.com/lists/oss-security/2022/09/09/2"
],
"uuid": "b1355173-632d-4935-89c2-d24170f5754c"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.0.9",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.0.9",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.4.47",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:element_plug-in_for_vcenter_server:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.361.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.263",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@eclipse.org",
"ID": "CVE-2022-2048"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"
},
{
"name": "DSA-5198",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5198"
},
{
"name": "[debian-lts-announce] 20220821 [SECURITY] [DLA 3079-1] jetty9 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00011.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220901-0006/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220901-0006/"
},
{
"name": "[oss-security] 20220909 Vulnerability in Jenkins",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/09/09/2"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-07-24T13:16Z",
"publishedDate": "2022-07-07T21:15Z"
}
}
}
OPENSUSE-SU-2024:12182-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "jetty-annotations-9.4.48-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the jetty-annotations-9.4.48-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12182",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12182-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2047 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2048 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2048/"
}
],
"title": "jetty-annotations-9.4.48-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12182-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "jetty-annotations-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-annotations-9.4.48-1.1.aarch64",
"product_id": "jetty-annotations-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-ant-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-ant-9.4.48-1.1.aarch64",
"product_id": "jetty-ant-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-cdi-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-cdi-9.4.48-1.1.aarch64",
"product_id": "jetty-cdi-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-client-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-client-9.4.48-1.1.aarch64",
"product_id": "jetty-client-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-continuation-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-continuation-9.4.48-1.1.aarch64",
"product_id": "jetty-continuation-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-deploy-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-deploy-9.4.48-1.1.aarch64",
"product_id": "jetty-deploy-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-fcgi-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-fcgi-9.4.48-1.1.aarch64",
"product_id": "jetty-fcgi-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-http-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-http-9.4.48-1.1.aarch64",
"product_id": "jetty-http-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-http-spi-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-http-spi-9.4.48-1.1.aarch64",
"product_id": "jetty-http-spi-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-io-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-io-9.4.48-1.1.aarch64",
"product_id": "jetty-io-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-jaas-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-jaas-9.4.48-1.1.aarch64",
"product_id": "jetty-jaas-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-jmx-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-jmx-9.4.48-1.1.aarch64",
"product_id": "jetty-jmx-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-jndi-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-jndi-9.4.48-1.1.aarch64",
"product_id": "jetty-jndi-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-jsp-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-jsp-9.4.48-1.1.aarch64",
"product_id": "jetty-jsp-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"product_id": "jetty-minimal-javadoc-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-openid-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-openid-9.4.48-1.1.aarch64",
"product_id": "jetty-openid-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-plus-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-plus-9.4.48-1.1.aarch64",
"product_id": "jetty-plus-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-proxy-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-proxy-9.4.48-1.1.aarch64",
"product_id": "jetty-proxy-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-quickstart-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-quickstart-9.4.48-1.1.aarch64",
"product_id": "jetty-quickstart-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-rewrite-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-rewrite-9.4.48-1.1.aarch64",
"product_id": "jetty-rewrite-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-security-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-security-9.4.48-1.1.aarch64",
"product_id": "jetty-security-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-server-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-server-9.4.48-1.1.aarch64",
"product_id": "jetty-server-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-servlet-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-servlet-9.4.48-1.1.aarch64",
"product_id": "jetty-servlet-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-servlets-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-servlets-9.4.48-1.1.aarch64",
"product_id": "jetty-servlets-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-start-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-start-9.4.48-1.1.aarch64",
"product_id": "jetty-start-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-util-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-util-9.4.48-1.1.aarch64",
"product_id": "jetty-util-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-util-ajax-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-util-ajax-9.4.48-1.1.aarch64",
"product_id": "jetty-util-ajax-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-webapp-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-webapp-9.4.48-1.1.aarch64",
"product_id": "jetty-webapp-9.4.48-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "jetty-xml-9.4.48-1.1.aarch64",
"product": {
"name": "jetty-xml-9.4.48-1.1.aarch64",
"product_id": "jetty-xml-9.4.48-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jetty-annotations-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-annotations-9.4.48-1.1.ppc64le",
"product_id": "jetty-annotations-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-ant-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-ant-9.4.48-1.1.ppc64le",
"product_id": "jetty-ant-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-cdi-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-cdi-9.4.48-1.1.ppc64le",
"product_id": "jetty-cdi-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-client-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-client-9.4.48-1.1.ppc64le",
"product_id": "jetty-client-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-continuation-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-continuation-9.4.48-1.1.ppc64le",
"product_id": "jetty-continuation-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-deploy-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-deploy-9.4.48-1.1.ppc64le",
"product_id": "jetty-deploy-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-fcgi-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-fcgi-9.4.48-1.1.ppc64le",
"product_id": "jetty-fcgi-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-http-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-http-9.4.48-1.1.ppc64le",
"product_id": "jetty-http-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-http-spi-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-http-spi-9.4.48-1.1.ppc64le",
"product_id": "jetty-http-spi-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-io-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-io-9.4.48-1.1.ppc64le",
"product_id": "jetty-io-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-jaas-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-jaas-9.4.48-1.1.ppc64le",
"product_id": "jetty-jaas-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-jmx-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-jmx-9.4.48-1.1.ppc64le",
"product_id": "jetty-jmx-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-jndi-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-jndi-9.4.48-1.1.ppc64le",
"product_id": "jetty-jndi-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-jsp-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-jsp-9.4.48-1.1.ppc64le",
"product_id": "jetty-jsp-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"product_id": "jetty-minimal-javadoc-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-openid-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-openid-9.4.48-1.1.ppc64le",
"product_id": "jetty-openid-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-plus-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-plus-9.4.48-1.1.ppc64le",
"product_id": "jetty-plus-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-proxy-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-proxy-9.4.48-1.1.ppc64le",
"product_id": "jetty-proxy-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-quickstart-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-quickstart-9.4.48-1.1.ppc64le",
"product_id": "jetty-quickstart-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-rewrite-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-rewrite-9.4.48-1.1.ppc64le",
"product_id": "jetty-rewrite-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-security-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-security-9.4.48-1.1.ppc64le",
"product_id": "jetty-security-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-server-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-server-9.4.48-1.1.ppc64le",
"product_id": "jetty-server-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-servlet-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-servlet-9.4.48-1.1.ppc64le",
"product_id": "jetty-servlet-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-servlets-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-servlets-9.4.48-1.1.ppc64le",
"product_id": "jetty-servlets-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-start-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-start-9.4.48-1.1.ppc64le",
"product_id": "jetty-start-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-util-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-util-9.4.48-1.1.ppc64le",
"product_id": "jetty-util-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-util-ajax-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-util-ajax-9.4.48-1.1.ppc64le",
"product_id": "jetty-util-ajax-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-webapp-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-webapp-9.4.48-1.1.ppc64le",
"product_id": "jetty-webapp-9.4.48-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "jetty-xml-9.4.48-1.1.ppc64le",
"product": {
"name": "jetty-xml-9.4.48-1.1.ppc64le",
"product_id": "jetty-xml-9.4.48-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jetty-annotations-9.4.48-1.1.s390x",
"product": {
"name": "jetty-annotations-9.4.48-1.1.s390x",
"product_id": "jetty-annotations-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-ant-9.4.48-1.1.s390x",
"product": {
"name": "jetty-ant-9.4.48-1.1.s390x",
"product_id": "jetty-ant-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-cdi-9.4.48-1.1.s390x",
"product": {
"name": "jetty-cdi-9.4.48-1.1.s390x",
"product_id": "jetty-cdi-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-client-9.4.48-1.1.s390x",
"product": {
"name": "jetty-client-9.4.48-1.1.s390x",
"product_id": "jetty-client-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-continuation-9.4.48-1.1.s390x",
"product": {
"name": "jetty-continuation-9.4.48-1.1.s390x",
"product_id": "jetty-continuation-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-deploy-9.4.48-1.1.s390x",
"product": {
"name": "jetty-deploy-9.4.48-1.1.s390x",
"product_id": "jetty-deploy-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-fcgi-9.4.48-1.1.s390x",
"product": {
"name": "jetty-fcgi-9.4.48-1.1.s390x",
"product_id": "jetty-fcgi-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-http-9.4.48-1.1.s390x",
"product": {
"name": "jetty-http-9.4.48-1.1.s390x",
"product_id": "jetty-http-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-http-spi-9.4.48-1.1.s390x",
"product": {
"name": "jetty-http-spi-9.4.48-1.1.s390x",
"product_id": "jetty-http-spi-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-io-9.4.48-1.1.s390x",
"product": {
"name": "jetty-io-9.4.48-1.1.s390x",
"product_id": "jetty-io-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-jaas-9.4.48-1.1.s390x",
"product": {
"name": "jetty-jaas-9.4.48-1.1.s390x",
"product_id": "jetty-jaas-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-jmx-9.4.48-1.1.s390x",
"product": {
"name": "jetty-jmx-9.4.48-1.1.s390x",
"product_id": "jetty-jmx-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-jndi-9.4.48-1.1.s390x",
"product": {
"name": "jetty-jndi-9.4.48-1.1.s390x",
"product_id": "jetty-jndi-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-jsp-9.4.48-1.1.s390x",
"product": {
"name": "jetty-jsp-9.4.48-1.1.s390x",
"product_id": "jetty-jsp-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-minimal-javadoc-9.4.48-1.1.s390x",
"product": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.s390x",
"product_id": "jetty-minimal-javadoc-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-openid-9.4.48-1.1.s390x",
"product": {
"name": "jetty-openid-9.4.48-1.1.s390x",
"product_id": "jetty-openid-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-plus-9.4.48-1.1.s390x",
"product": {
"name": "jetty-plus-9.4.48-1.1.s390x",
"product_id": "jetty-plus-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-proxy-9.4.48-1.1.s390x",
"product": {
"name": "jetty-proxy-9.4.48-1.1.s390x",
"product_id": "jetty-proxy-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-quickstart-9.4.48-1.1.s390x",
"product": {
"name": "jetty-quickstart-9.4.48-1.1.s390x",
"product_id": "jetty-quickstart-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-rewrite-9.4.48-1.1.s390x",
"product": {
"name": "jetty-rewrite-9.4.48-1.1.s390x",
"product_id": "jetty-rewrite-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-security-9.4.48-1.1.s390x",
"product": {
"name": "jetty-security-9.4.48-1.1.s390x",
"product_id": "jetty-security-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-server-9.4.48-1.1.s390x",
"product": {
"name": "jetty-server-9.4.48-1.1.s390x",
"product_id": "jetty-server-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-servlet-9.4.48-1.1.s390x",
"product": {
"name": "jetty-servlet-9.4.48-1.1.s390x",
"product_id": "jetty-servlet-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-servlets-9.4.48-1.1.s390x",
"product": {
"name": "jetty-servlets-9.4.48-1.1.s390x",
"product_id": "jetty-servlets-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-start-9.4.48-1.1.s390x",
"product": {
"name": "jetty-start-9.4.48-1.1.s390x",
"product_id": "jetty-start-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-util-9.4.48-1.1.s390x",
"product": {
"name": "jetty-util-9.4.48-1.1.s390x",
"product_id": "jetty-util-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-util-ajax-9.4.48-1.1.s390x",
"product": {
"name": "jetty-util-ajax-9.4.48-1.1.s390x",
"product_id": "jetty-util-ajax-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-webapp-9.4.48-1.1.s390x",
"product": {
"name": "jetty-webapp-9.4.48-1.1.s390x",
"product_id": "jetty-webapp-9.4.48-1.1.s390x"
}
},
{
"category": "product_version",
"name": "jetty-xml-9.4.48-1.1.s390x",
"product": {
"name": "jetty-xml-9.4.48-1.1.s390x",
"product_id": "jetty-xml-9.4.48-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jetty-annotations-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-annotations-9.4.48-1.1.x86_64",
"product_id": "jetty-annotations-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-ant-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-ant-9.4.48-1.1.x86_64",
"product_id": "jetty-ant-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-cdi-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-cdi-9.4.48-1.1.x86_64",
"product_id": "jetty-cdi-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-client-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-client-9.4.48-1.1.x86_64",
"product_id": "jetty-client-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-continuation-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-continuation-9.4.48-1.1.x86_64",
"product_id": "jetty-continuation-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-deploy-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-deploy-9.4.48-1.1.x86_64",
"product_id": "jetty-deploy-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-fcgi-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-fcgi-9.4.48-1.1.x86_64",
"product_id": "jetty-fcgi-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-http-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-http-9.4.48-1.1.x86_64",
"product_id": "jetty-http-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-http-spi-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-http-spi-9.4.48-1.1.x86_64",
"product_id": "jetty-http-spi-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-io-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-io-9.4.48-1.1.x86_64",
"product_id": "jetty-io-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-jaas-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-jaas-9.4.48-1.1.x86_64",
"product_id": "jetty-jaas-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-jmx-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-jmx-9.4.48-1.1.x86_64",
"product_id": "jetty-jmx-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-jndi-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-jndi-9.4.48-1.1.x86_64",
"product_id": "jetty-jndi-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-jsp-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-jsp-9.4.48-1.1.x86_64",
"product_id": "jetty-jsp-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"product_id": "jetty-minimal-javadoc-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-openid-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-openid-9.4.48-1.1.x86_64",
"product_id": "jetty-openid-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-plus-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-plus-9.4.48-1.1.x86_64",
"product_id": "jetty-plus-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-proxy-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-proxy-9.4.48-1.1.x86_64",
"product_id": "jetty-proxy-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-quickstart-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-quickstart-9.4.48-1.1.x86_64",
"product_id": "jetty-quickstart-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-rewrite-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-rewrite-9.4.48-1.1.x86_64",
"product_id": "jetty-rewrite-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-security-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-security-9.4.48-1.1.x86_64",
"product_id": "jetty-security-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-server-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-server-9.4.48-1.1.x86_64",
"product_id": "jetty-server-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-servlet-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-servlet-9.4.48-1.1.x86_64",
"product_id": "jetty-servlet-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-servlets-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-servlets-9.4.48-1.1.x86_64",
"product_id": "jetty-servlets-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-start-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-start-9.4.48-1.1.x86_64",
"product_id": "jetty-start-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-util-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-util-9.4.48-1.1.x86_64",
"product_id": "jetty-util-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-util-ajax-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-util-ajax-9.4.48-1.1.x86_64",
"product_id": "jetty-util-ajax-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-webapp-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-webapp-9.4.48-1.1.x86_64",
"product_id": "jetty-webapp-9.4.48-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "jetty-xml-9.4.48-1.1.x86_64",
"product": {
"name": "jetty-xml-9.4.48-1.1.x86_64",
"product_id": "jetty-xml-9.4.48-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-annotations-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-annotations-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-annotations-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-annotations-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-annotations-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x"
},
"product_reference": "jetty-annotations-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-annotations-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-annotations-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-ant-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-ant-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-ant-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-ant-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-ant-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x"
},
"product_reference": "jetty-ant-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-ant-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-ant-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-cdi-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-cdi-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-cdi-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-cdi-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-cdi-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x"
},
"product_reference": "jetty-cdi-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-cdi-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-cdi-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-client-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-client-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-client-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-client-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-client-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x"
},
"product_reference": "jetty-client-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-client-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-client-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-continuation-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-continuation-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-continuation-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-continuation-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-continuation-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x"
},
"product_reference": "jetty-continuation-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-continuation-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-continuation-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-deploy-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-deploy-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-deploy-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-deploy-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-deploy-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x"
},
"product_reference": "jetty-deploy-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-deploy-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-deploy-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-fcgi-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-fcgi-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-fcgi-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-fcgi-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-fcgi-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x"
},
"product_reference": "jetty-fcgi-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-fcgi-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-fcgi-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-http-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-http-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x"
},
"product_reference": "jetty-http-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-http-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-spi-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-http-spi-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-spi-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-http-spi-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-spi-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x"
},
"product_reference": "jetty-http-spi-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-http-spi-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-http-spi-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-io-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-io-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-io-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-io-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-io-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x"
},
"product_reference": "jetty-io-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-io-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-io-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jaas-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-jaas-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jaas-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-jaas-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jaas-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x"
},
"product_reference": "jetty-jaas-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jaas-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-jaas-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jmx-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-jmx-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jmx-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-jmx-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jmx-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x"
},
"product_reference": "jetty-jmx-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jmx-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-jmx-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jndi-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-jndi-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jndi-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-jndi-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jndi-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x"
},
"product_reference": "jetty-jndi-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jndi-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-jndi-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jsp-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-jsp-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jsp-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-jsp-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jsp-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x"
},
"product_reference": "jetty-jsp-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-jsp-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-jsp-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x"
},
"product_reference": "jetty-minimal-javadoc-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-minimal-javadoc-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-openid-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-openid-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-openid-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-openid-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-openid-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x"
},
"product_reference": "jetty-openid-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-openid-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-openid-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-plus-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-plus-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-plus-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-plus-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-plus-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x"
},
"product_reference": "jetty-plus-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-plus-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-plus-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-proxy-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-proxy-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-proxy-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-proxy-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-proxy-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x"
},
"product_reference": "jetty-proxy-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-proxy-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-proxy-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-quickstart-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-quickstart-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-quickstart-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-quickstart-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-quickstart-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x"
},
"product_reference": "jetty-quickstart-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-quickstart-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-quickstart-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-rewrite-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-rewrite-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-rewrite-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-rewrite-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-rewrite-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x"
},
"product_reference": "jetty-rewrite-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-rewrite-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-rewrite-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-security-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-security-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-security-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-security-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-security-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x"
},
"product_reference": "jetty-security-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-security-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-security-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-server-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-server-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-server-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-server-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-server-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x"
},
"product_reference": "jetty-server-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-server-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-server-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlet-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-servlet-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlet-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-servlet-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlet-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x"
},
"product_reference": "jetty-servlet-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlet-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-servlet-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlets-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-servlets-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlets-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-servlets-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlets-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x"
},
"product_reference": "jetty-servlets-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-servlets-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-servlets-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-start-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-start-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-start-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-start-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-start-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x"
},
"product_reference": "jetty-start-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-start-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-start-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-util-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-util-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x"
},
"product_reference": "jetty-util-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-util-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-ajax-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-util-ajax-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-ajax-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-util-ajax-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-ajax-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x"
},
"product_reference": "jetty-util-ajax-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-util-ajax-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-util-ajax-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-webapp-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-webapp-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-webapp-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-webapp-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-webapp-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x"
},
"product_reference": "jetty-webapp-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-webapp-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-webapp-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-xml-9.4.48-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64"
},
"product_reference": "jetty-xml-9.4.48-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-xml-9.4.48-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le"
},
"product_reference": "jetty-xml-9.4.48-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-xml-9.4.48-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x"
},
"product_reference": "jetty-xml-9.4.48-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jetty-xml-9.4.48-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
},
"product_reference": "jetty-xml-9.4.48-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2047"
}
],
"notes": [
{
"category": "general",
"text": "In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2047",
"url": "https://www.suse.com/security/cve/CVE-2022-2047"
},
{
"category": "external",
"summary": "SUSE Bug 1201317 for CVE-2022-2047",
"url": "https://bugzilla.suse.com/1201317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2048"
}
],
"notes": [
{
"category": "general",
"text": "In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2048",
"url": "https://www.suse.com/security/cve/CVE-2022-2048"
},
{
"category": "external",
"summary": "SUSE Bug 1201316 for CVE-2022-2048",
"url": "https://bugzilla.suse.com/1201316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-annotations-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-ant-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-cdi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-client-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-continuation-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-deploy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-fcgi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-http-spi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-io-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jaas-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jmx-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jndi-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-jsp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-minimal-javadoc-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-openid-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-plus-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-proxy-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-quickstart-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-rewrite-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-security-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-server-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlet-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-servlets-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-start-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-util-ajax-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-webapp-9.4.48-1.1.x86_64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.aarch64",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.ppc64le",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.s390x",
"openSUSE Tumbleweed:jetty-xml-9.4.48-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2048"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.