{"id":"RHSA-2023:3622","summary":"Red Hat Security Advisory: jenkins and jenkins-2-plugins security update","modified":"2026-03-25T10:02:48Z","published":"2024-09-30T07:08:01Z","upstream":["CVE-2022-29599","CVE-2022-30953","CVE-2022-30954","CVE-2023-1370","CVE-2023-1436","CVE-2023-20860","CVE-2023-20861","CVE-2023-27903","CVE-2023-27904"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3622"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://docs.openshift.com/container-platform/4.13/cicd/jenkins/important-changes-to-openshift-jenkins-images.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119646"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119647"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180530"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188542"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3622.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30953"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30953"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30953"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-30954"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-30954"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30954"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1370"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1370"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1370"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-493p-pfq6-5258"},{"type":"ARTICLE","url":"https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-1436"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-1436"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1436"},{"type":"ARTICLE","url":"https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20860"},{"type":"ARTICLE","url":"https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20861"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20861"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27903"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3058"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27904"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2120"}],"affected":[{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:ocp_tools:4.13::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.13.1686680473-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3622.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:ocp_tools:4.13::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.401.1.1686680404-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3622.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}