First published: Mon Feb 24 2020(Updated: )
Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka "the Hash DoS attack."
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudbees Jenkins | >=1.400.0<1.400.0.11 | |
Cloudbees Jenkins | >=1.424.0<1.424.2.1 | |
Jenkins Jenkins | <1.424.2 | |
Jenkins Jenkins | <1.447 | |
maven/org.jenkins-ci.main:jenkins-core | <1.424.2 | 1.424.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.425<1.447 | 1.447 |
>=1.400.0<1.400.0.11 | ||
>=1.424.0<1.424.2.1 | ||
<1.424.2 | ||
<1.447 | ||
debian/jenkins | ||
debian/jenkins-executable-war | ||
debian/jenkins-winstone |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.