-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.1 jenkins security update Advisory ID: RHSA-2019:2548-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2019:2548 Issue date: 2019-08-28 CVE Names: CVE-2019-10352 CVE-2019-10353 CVE-2019-10354 ==================================================================== 1. Summary: An update for jenkins is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.1 - noarch 3. Description: Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix(es): * jenkins: CSRF protection tokens did not expire (CVE-2019-10353) * jenkins: Arbitrary file write vulnerability using file parameter definitions (CVE-2019-10352) * jenkins: Unauthorized view fragment access (CVE-2019-10354) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.11, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html 5. Bugs fixed (https://bugzilla.redhat.com/): 1730824 - CVE-2019-10352 jenkins: Arbitrary file write vulnerability using file parameter definitions (SECURITY-1424) 1730869 - CVE-2019-10354 jenkins: Unauthorized view fragment access (SECURITY-534) 1730877 - CVE-2019-10353 jenkins: CSRF protection tokens did not expire (SECURITY-626) 6. Package List: Red Hat OpenShift Container Platform 4.1: Source: jenkins-2.176.2.1563461785-1.el7.src.rpm noarch: jenkins-2.176.2.1563461785-1.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-10352 https://access.redhat.com/security/cve/CVE-2019-10353 https://access.redhat.com/security/cve/CVE-2019-10354 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXWazydzjgjWX9erEAQiR+Q//cbzj4WFN+sgt+bqLtoXf0Q8WUbn1DbRL 1Yq9A9QoIaDSvLuXYOTqk7c5QBXqhpDKHekeZ2ru1XcBqQFz9ZcqeG2V29/F2mOQ QwZnievaw6rNk3oD4iiToAyLSzWbQlak28MXSJperK+XQ32wnqxInKxqLhp0BkK+ XqnOqMWTrqAr2j+BHV3mTWHUqMu1EXKSyvvFP/2mlXDvCXrPNvhPhEMA5L5CRybA 5Ktr0+meQDv8ujhWJYLadYHrwnsPAC8rL+m8qP9LAHzM15xIjSfLp+x1HEP+dPrg pErgDJWw5ALbbFDcb4eHMlRh1P1//sCUPtZzVJawjM2yx0Iwsx+1O1TPHDTaBJSG l0CF6hkCDAm3/wKg/jWMSJDVrXQcmJERvVSe2fc4QdMx6YzjACBTZcEqROvSInJ1 Flsa/FrzpSRNFl46MSj2ghByOja97lhNThs8UIEPUN+xmeL+h54CyM13uwykRtS7 6srSfVKBfeNbsDaLY7q+RIqNjLL4w28LvOVi1/+1KYUp7cPkVVvenV74RPVgLaJz Izk/C9cUsudEquR47uIxOVadxc6rx7B2xe5NiZ0G8EmXYVW/svMKnshcE+fa1JY1 o4GAiodu0TQ/sCvUidp0bxmN+w87YMjQxgiZdfJxVJzUwA/rlM9z2NXKhwJ2xcLM T2yW75l733g=Q2RJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce