Jenkins uses the XStream library to serialize and deserialize XML. Its maintainer [recently published a security vulnerability](http://www.openwall.com/lists/oss-security/2017/04/03/4) that allows anyone able to provide XML to Jenkins for processing using XStream to crash the Java process. In Jenkins this typically applies to users with permission to create or configure items (jobs), views, or agents.
Jenkins now prohibits the attempted deserialization of void / Void that results in a crash.
暂无评论