{"id":"RHSA-2023:3663","summary":"Red Hat Security Advisory: jenkins and jenkins-2-plugins security update","modified":"2026-03-27T10:04:48Z","published":"2024-09-30T16:35:09Z","upstream":["CVE-2022-2048","CVE-2022-22976","CVE-2022-40149","CVE-2022-40150","CVE-2022-41966","CVE-2022-42003","CVE-2022-42004","CVE-2023-1370","CVE-2023-1436","CVE-2023-20860","CVE-2023-26464","CVE-2023-27898","CVE-2023-27899","CVE-2023-27903","CVE-2023-27904","CVE-2023-32977","CVE-2023-32981"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3663"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2087214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2116952"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135770"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182864"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188542"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207835"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3663.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2048"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2048"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2048"},{"type":"ARTICLE","url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-22976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-22976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22976"},{"type":"ARTICLE","url":"https://tanzu.vmware.com/security/cve-2022-22976"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"},{"type":"ARTICLE","url":"https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41966"},{"type":"ARTICLE","url":"https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42003"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42003"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42003"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42004"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1370"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1370"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1370"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-493p-pfq6-5258"},{"type":"ARTICLE","url":"https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436"},{"type":"ARTICLE","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20860"},{"type":"ARTICLE","url":"https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-26464"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-26464"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26464"},{"type":"ARTICLE","url":"https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27898"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3037"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27899"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27899"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27899"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27903"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3058"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27904"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2120"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32977"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3042"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32981"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196"}],"affected":[{"package":{"name":"jenkins","ecosystem":"Red Hat:ocp_tools:4.11::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.401.1.1686831596-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3663.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:ocp_tools:4.11::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.11.1686831822-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3663.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}