Jervis is a library for Job DSL plugin scripts and shared Jenkins pipeline libraries. Prior to 2.2, Jervis uses java.util.Random() which is not cryptographically secure for timing attack mitigation. This vulnerability is fixed in 2.2.
References
| Link | Resource |
|---|---|
| https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a | Patch |
| https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww | Vendor Advisory Patch |
Configurations
History
20 Jan 2026, 17:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/samrocketman/jervis/commit/c3981ff71de7b0f767dfe7b37a2372cb2a51974a - Patch | |
| References | () https://github.com/samrocketman/jervis/security/advisories/GHSA-c9q6-g3hr-8gww - Vendor Advisory, Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Samrocketman
Samrocketman jervis |
|
| CPE | cpe:2.3:a:samrocketman:jervis:*:*:*:*:*:*:*:* |
13 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 20:16
Updated : 2026-01-20 17:36
NVD link : CVE-2025-68704
Mitre link : CVE-2025-68704
CVE.ORG link : CVE-2025-68704
JSON object : View
Products Affected
samrocketman
- jervis
CWE
CWE-330
Use of Insufficiently Random Values
