{"id":"RHSA-2024:0777","summary":"Red Hat Security Advisory: jenkins and jenkins-2-plugins security update","modified":"2026-04-11T10:01:57Z","published":"2024-10-02T11:39:23Z","related":["GO-2023-2102"],"upstream":["CVE-2022-25857","CVE-2022-29599","CVE-2022-42889","CVE-2023-24422","CVE-2023-25761","CVE-2023-25762","CVE-2023-2976","CVE-2023-35116","CVE-2023-37946","CVE-2023-37947","CVE-2023-39325","CVE-2023-40336","CVE-2023-40337","CVE-2023-40338","CVE-2023-40339","CVE-2023-40341","CVE-2023-44487"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0777"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2066479"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2126789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2164278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170039"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170041"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215214"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2215229"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222709"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222710"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232422"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232423"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232424"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2243296"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JKNS-271"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JKNS-289"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JKNS-337"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JKNS-344"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JKNS-345"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-11158"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-11253"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-11254"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-11446"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-1357"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-13869"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-14111"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-14609"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-15646"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-15902"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-1709"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-1942"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-2099"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-2184"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-2318"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-23438"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-27388"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-655"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-6579"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-6870"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-710"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-8377"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-8442"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPTOOLS-244"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0777.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25857"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25857"},{"type":"ARTICLE","url":"https://bitbucket.org/snakeyaml/snakeyaml/issues/525"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-29599"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-29599"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29599"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42889"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42889"},{"type":"ARTICLE","url":"https://blogs.apache.org/security/entry/cve-2022-42889"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q4/22"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-2976"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-2976"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2976"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24422"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25761"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25761"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25762"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25762"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-35116"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-35116"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35116"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-37946"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-37946"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37946"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2998"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-37947"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-37947"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37947"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2999"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39325"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39325"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-44487"},{"type":"ARTICLE","url":"https://go.dev/issue/63417"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-2102"},{"type":"ARTICLE","url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40336"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40336"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40336"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3106"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40337"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40337"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40337"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3105"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40338"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40338"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40338"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40339"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40339"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40339"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3090"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40341"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-44487"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"},{"type":"ARTICLE","url":"https://github.com/dotnet/announcements/issues/277"},{"type":"ARTICLE","url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}],"affected":[{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:ocp_tools:4.14::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.14.1706516441-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0777.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:ocp_tools:4.14::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.426.3.1706516352-3.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0777.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}