CVE Vulnerabilities

CVE-2025-67635

Improper Resource Shutdown or Release

Published: Dec 10, 2025 | Modified: Dec 17, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
root.io logo minimus.io logo echo.ai logo

Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service.

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

NameVendorStart VersionEnd Version
JenkinsJenkins*2.528.3 (excluding)
JenkinsJenkins*2.541 (excluding)
OpenShift Developer Tools and Services 4.12RedHatocp-tools-4/jenkins-rhel8:sha256:30b043d6c77a18e0f3ff2e30da493588d9c7b6cc91ff887100ef869853e264f3*
OpenShift Developer Tools and Services 4.13RedHatocp-tools-4/jenkins-rhel8:sha256:30b043d6c77a18e0f3ff2e30da493588d9c7b6cc91ff887100ef869853e264f3*
OpenShift Developer Tools and Services 4.14RedHatocp-tools-4/jenkins-rhel8:sha256:27db4f7a070211cfe9a0383cf784a664fcbe3a82605611f9f9d8c99cf93c31aa*
OpenShift Developer Tools and Services 4.15RedHatocp-tools-4/jenkins-rhel8:sha256:27db4f7a070211cfe9a0383cf784a664fcbe3a82605611f9f9d8c99cf93c31aa*
OpenShift Developer Tools and Services 4.16RedHatocp-tools-4/jenkins-rhel9:sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b*
OpenShift Developer Tools and Services 4.17RedHatocp-tools-4/jenkins-rhel9:sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b*
OpenShift Developer Tools and Services 4.18RedHatocp-tools-4/jenkins-rhel9:sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b*
OpenShift Developer Tools and Services 4.19RedHatocp-tools-4/jenkins-rhel9:sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b*
OpenShift Developer Tools and Services 4.2RedHatocp-tools-4/jenkins-rhel9:sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References