A user-supplied regular expression in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier was processed in a way that wasn't interruptible, allowing attackers to have Jenkins evaluate a regular expression without the ability to interrupt this process.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: jenkins

Published: 2019-12-17T14:40:47

Updated: 2023-10-24T16:50:45.807Z

Reserved: 2019-09-20T00:00:00


Link: CVE-2019-16555

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-12-17T15:15:16.707

Modified: 2023-10-25T18:16:27.077


Link: CVE-2019-16555

JSON object: View

cve-icon Redhat Information

No data.

CWE