Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.
References
| Link | Resource |
|---|---|
| https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a | Patch |
| https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:36
NVD link : CVE-2025-68704
Mitre link : CVE-2025-68704
CVE.ORG link : CVE-2025-68704
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-330
Use of Insufficiently Random Values
