Non-constant time comparison of inbound TCP agent connection secret
Moderate severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Dec 13, 2023
Package
Affected versions
<= 2.204.1
>= 2.205, <= 2.218
Patched versions
2.204.2
2.219
Description
Published by the National Vulnerability Database
Jan 29, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 19, 2022
Last updated
Dec 13, 2023
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison validating the connection secret when an inbound TCP agent connection is initiated. This could potentially allow attackers to use statistical methods to obtain the connection secret.
Jenkins 2.219, LTS 2.204.2 now uses a constant-time comparison function for verifying connection secrets.
References