Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jenkins@2.361.1.1675406172-1?arch=el8
purl pkg:rpm/redhat/jenkins@2.361.1.1675406172-1?arch=el8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-vgg4-g95a-gkey
Aliases:
CVE-2022-34174
GHSA-9grj-j43m-mjqr
Observable timing discrepancy allows determining username validity in Jenkins In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. This allows attackers to determine the validity of attacker-specified usernames. Login attempts with an invalid username now validate a synthetic password to eliminate the timing discrepancy in Jenkins 2.356, LTS 2.332.4. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:58:08.510053+00:00 RedHat Importer Affected by VCID-vgg4-g95a-gkey https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34174.json 38.0.0