Jenkins, a popular open source automation server software, has patched a Critical buffer corruption vulnerability in bundled Jetty.
Jenkins 2.224 to 2.242 and LTS 2.222.1 to 2.235.4 versions are bundled with Jetty 9.4.27 and are impacted by the vulnerability CVE-2019-17638.
“Winstone-Jetty, a wrapper around Jetty, to act as HTTP and servlet server when started using java -jar jenkins.war. This is how Jenkins is run when using any of the installers or packages, but not when run using servlet containers such as Tomcat,” Jenkins noted in the advisory.
“This vulnerability may allow unauthenticated attackers to obtain HTTP response headers that may include sensitive data intended for another user.”
To address the vulnerability, Jenkins weekly should be updated to version 2.243 and Jenkins LTS should be updated to version 2.235.5.