RHEL 7 : jenkins (RHSA-2016:1206)

high Nessus Plugin ID 119375

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An updated Jenkins package and image that includes security fixes are now available for Red Hat OpenShift Enterprise 3.2.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

OpenShift Enterprise by Red Hat is the company's cloud computing Platform- as-a-Service (PaaS) solution designed for on-premise or private cloud deployments.

Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron.

Security Fix(es) :

* The Jenkins continuous integration server has been updated to upstream version 1.651.2 LTS that addresses a large number of security issues, including open redirects, a potential denial of service, unsafe handling of user provided environment variables and several instances of sensitive information disclosure. (CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727)

Refer to the changelog listed in the References section for a list of changes.

This update includes the following image :

openshift3/jenkins-1-rhel7:1.651.2-4

All OpenShift Enterprise 3.2 users are advised to upgrade to the updated package and image.

Solution

Update the affected jenkins and / or jenkins-plugin-openshift-pipeline packages.

See Also

https://access.redhat.com/errata/RHSA-2016:1206

https://access.redhat.com/security/cve/cve-2016-3721

https://access.redhat.com/security/cve/cve-2016-3722

https://access.redhat.com/security/cve/cve-2016-3723

https://access.redhat.com/security/cve/cve-2016-3724

https://access.redhat.com/security/cve/cve-2016-3725

https://access.redhat.com/security/cve/cve-2016-3726

https://access.redhat.com/security/cve/cve-2016-3727

Plugin Details

Severity: High

ID: 119375

File Name: redhat-RHSA-2016-1206.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/4/2018

Updated: 2/1/2022

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2016-3726

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:jenkins-plugin-openshift-pipeline, p-cpe:/a:redhat:enterprise_linux:jenkins, cpe:/o:redhat:enterprise_linux:7

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/6/2016

Vulnerability Publication Date: 5/17/2016

Reference Information

CVE: CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727

RHSA: 2016:1206