(RHSA-2024:0778) Important: Jenkins and Jenkins-2-plugins security update

Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix(es): apache-commons-text: variable interpolation RCE (CVE-2022-42889) google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization (CVE-2020-7692) maven: Block repositories using http by default (CVE-2021-26291) snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422) jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE (CVE-2024-23897) jenkins: cross-site WebSocket hijacking (CVE-2024-23898) golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) guava: insecure temporary directory creation (CVE-2023-2976) springframework: Spring Expression DoS Vulnerability (CVE-2023-20861) spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout (CVE-2023-20862) jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin (CVE-2023-25761) jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin (CVE-2023-25762) jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()…Read More

Back to Main

Subscribe for the latest news: