[SECURITY] Fedora 22 Update: jenkins-executable-war-1.29-4.fc22
updates at fedoraproject.org
updates at fedoraproject.org
Tue Apr 21 19:09:03 UTC 2015
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-5430
2015-04-02 17:49:05
--------------------------------------------------------------------------------
Name : jenkins-executable-war
Product : Fedora 22
Version : 1.29
Release : 4.fc22
URL : https://github.com/jenkinsci/extras-executable-war
Summary : Jenkins Executable War
Description :
This package enables executable war support for Jenkins.
--------------------------------------------------------------------------------
Update Information:
Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177)
https://bugzilla.redhat.com/show_bug.cgi?id=1205615
[ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125)
https://bugzilla.redhat.com/show_bug.cgi?id=1205620
[ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163)
https://bugzilla.redhat.com/show_bug.cgi?id=1205623
[ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166)
https://bugzilla.redhat.com/show_bug.cgi?id=1205627
[ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180)
https://bugzilla.redhat.com/show_bug.cgi?id=1205616
[ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162)
https://bugzilla.redhat.com/show_bug.cgi?id=1205622
[ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165)
https://bugzilla.redhat.com/show_bug.cgi?id=1205625
[ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167)
https://bugzilla.redhat.com/show_bug.cgi?id=1205632
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update jenkins-executable-war' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
More information about the package-announce
mailing list