{"id":"RHSA-2023:3610","summary":"Red Hat Security Advisory: jenkins and jenkins-2-plugins security update","modified":"2026-04-02T10:03:46Z","published":"2024-09-30T07:07:53Z","upstream":["CVE-2021-46877","CVE-2022-29599","CVE-2022-30953","CVE-2022-30954","CVE-2022-40149","CVE-2022-40150","CVE-2022-45693","CVE-2023-1370","CVE-2023-20860","CVE-2023-20861","CVE-2023-24422","CVE-2023-32977","CVE-2023-32981"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3610"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135770"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155970"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2164278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180530"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2185707"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188542"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207835"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3610.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-46877"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-46877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-46877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30953"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30953"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30954"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30954"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"},{"type":"ARTICLE","url":"https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1370"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1370"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1370"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-493p-pfq6-5258"},{"type":"ARTICLE","url":"https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20860"},{"type":"ARTICLE","url":"https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20861"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24422"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32977"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3042"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32981"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196"}],"affected":[{"package":{"name":"jenkins","ecosystem":"Red Hat:ocp_tools:4.12::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.401.1.1686649641-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3610.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:ocp_tools:4.12::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.12.1686649756-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3610.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}