Type | URI |
---|---|
jenkinsci-cert@googlegroups.com | http://www.openwall.com/lists/oss-security/2024/01/24/6 |
vendor-advisory | https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314 |
jenkinsci-cert@googlegroups.com | http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html |
jenkinsci-cert@googlegroups.com | http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html |
jenkinsci-cert@googlegroups.com | https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/ |
CPE URI | Source package | Min version | Max version |
---|---|---|---|
|
jenkins | >= 0 | < 1.606 |
|
jenkins | >= 2.442 | < * |
|
jenkins | >= 2.426.3 | < 2.426.* |
|
jenkins | >= 2.440.1 | < 2.440.* |
Source package | Branch | Version | Maintainer | Status |
---|---|---|---|---|
jenkins | 3.19-community | 2.440.3-r0 | Francesco Colista <fcolista@alpinelinux.org> | possibly vulnerable |
jenkins | 3.20-community | 2.440.2-r0 | Francesco Colista <fcolista@alpinelinux.org> | possibly vulnerable |