Known Vulnerabilities for Google Compute Engine by Jenkins

Listed below are 6 of the newest known vulnerabilities associated with "Google Compute Engine" by "Jenkins".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-43322 json In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: Fix UAF in le_read_features_complet... Not Provided 2026-05-08 2026-05-11
CVE-2026-43164 json In the Linux kernel, the following vulnerability has been resolved: udplite: Fix null-ptr-deref in __udp_enqueue_schedule_sk... Not Provided 2026-05-06 2026-05-08
CVE-2026-43016 json In the Linux kernel, the following vulnerability has been resolved: bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_... Not Provided 2026-05-01 2026-05-03
CVE-2026-31551 json In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix static_branch_dec() underflow for aq... Not Provided 2026-04-24 2026-04-24
CVE-2026-23385 json In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: clone set on flush only Syzbot wi... Not Provided 2026-03-25 2026-04-13
CVE-2026-23010 json In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot re... Not Provided 2026-01-25 2026-04-27
CVE-2026-23004 json In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_unc... Not Provided 2026-01-25 2026-04-27
CVE-2026-23003 json In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv... Not Provided 2026-01-25 2026-04-27
CVE-2025-39828 json In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_cont... Not Provided 2025-09-16 2026-05-12
CVE-2025-38400 json In the Linux kernel, the following vulnerability has been resolved: nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_ini... Not Provided 2025-07-25 2026-05-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationJenkinsGoogle Compute Engine4.2.0
ApplicationJenkinsGoogle Compute Engine4.1.1
ApplicationJenkinsGoogle Compute Engine4.1.0
ApplicationJenkinsGoogle Compute Engine4.0.0
ApplicationJenkinsGoogle Compute Engine3.4.0
ApplicationJenkinsGoogle Compute Engine3.3.2
ApplicationJenkinsGoogle Compute Engine3.3.1
ApplicationJenkinsGoogle Compute Engine3.3.0
ApplicationJenkinsGoogle Compute Engine3.2.0
ApplicationJenkinsGoogle Compute Engine3.1.1
ApplicationJenkinsGoogle Compute Engine3.1.0
ApplicationJenkinsGoogle Compute Engine3.0.0
ApplicationJenkinsGoogle Compute Engine2.0.0
ApplicationJenkinsGoogle Compute Engine1.0.9
ApplicationJenkinsGoogle Compute Engine1.0.8
ApplicationJenkinsGoogle Compute Engine1.0.7
ApplicationJenkinsGoogle Compute Engine1.0.6
ApplicationJenkinsGoogle Compute Engine1.0.5
ApplicationJenkinsGoogle Compute Engine1.0.4
ApplicationJenkinsGoogle Compute Engine1.0.3
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report