Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 14 Dec 2017 04:10:26 +0100
From: Daniel Beck <>
Subject: Multiple vulnerabilities in Jenkins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:

* Jenkins (weekly) 2.95
* Jenkins (LTS) 2.89.2

Descriptions of the vulnerabilities are below. Some more details, 
severity, and attribution can be found here:

We provide advance notification for security updates on this mailing list:

If you discover security vulnerabilities in Jenkins, please report them as
described here:


A race condition during Jenkins startup could result in the wrong order of
execution of commands during initialization.

On Jenkins 2.81 and newer, including LTS 2.89.1, this could in rare cases
(we estimate less than 20% of new instances) result in failure to
initialize the setup wizard on the first startup. This resulted in multiple
security-related settings not being set to their usual strict default.
Affected instances need to be configured to restrict access.

Additionally, there's a very short window of time after startup during
which Jenkins may no longer show the "Please wait while Jenkins is getting
ready to work" message, but Cross-Site Request Forgery (CSRF) protection
may not yet be effective. As of publication of this advisory, we've been
unable to confirm this can actually be exploited, but generally recommend
that users upgrade their instances.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.