Lucene search

K
redhatRedHatRHSA-2023:6171
HistoryOct 30, 2023 - 11:04 a.m.

(RHSA-2023:6171) Critical: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update

2023-10-3011:04:05
access.redhat.com
30
red hat ocp tools
jenkins
security update
cve-2023-27904
cve-2023-27903
cve-2022-42889
cve-2023-25762
cve-2023-25761
cve-2022-1471
cve-2023-24422
cve-2022-29599
cve-2023-39325
unix

10 High

AI Score

Confidence

High

0.972 High

EPSS

Percentile

99.8%

Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron.

Security Fix(es):

CVE-2023-27904 jenkins: Information disclosure through error stack traces related to agents
CVE-2023-27903 jenkins: Temporary file parameter created with insecure permissions
CVE-2022-42889 jenkins-2-plugins: apache-commons-text: variable interpolation RCE
CVE-2023-25762 jenkins-2-plugins: jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin
CVE-2023-25761 jenkins-2-plugins: jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin
CVE-2022-42889 jenkins-2-plugins: apache-commons-text: variable interpolation RCE
CVE-2022-1471 jenkins-2-plugins: SnakeYaml: Constructor Deserialization Remote Code Execution
CVE-2023-24422 jenkins-2-plugins: jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin
CVE-2023-25761 jenkins-2-plugins: jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin
CVE-2023-25762 jenkins-2-plugins: jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin
CVE-2022-29599 jenkins-2-plugins: maven-shared-utils: Command injection via Commandline class
CVE-2023-39325 openshift-jenkins-2-container: golang: net/http, x/net/http2: rapid stream resets can cause excessive work/

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.