[SECURITY] Fedora 22 Update: jenkins-executable-war-1.29-4.fc22

updates at fedoraproject.org updates at fedoraproject.org
Tue Apr 21 19:09:03 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-5430
2015-04-02 17:49:05
--------------------------------------------------------------------------------

Name        : jenkins-executable-war
Product     : Fedora 22
Version     : 1.29
Release     : 4.fc22
URL         : https://github.com/jenkinsci/extras-executable-war
Summary     : Jenkins Executable War
Description :
This package enables executable war support for Jenkins.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2015-1806, CVE-2015-1807, CVE-2015-1813, CVE-2015-1812, CVE-2015-1810, CVE-2015-1808, CVE-2015-1809, CVE-2015-1814, CVE-2015-1811
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1205615 - CVE-2015-1812 CVE-2015-1813 jenkins: Reflective XSS vulnerability (SECURITY-171, SECURITY-177)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205615
  [ 2 ] Bug #1205620 - CVE-2015-1806 jenkins: Combination filter Groovy script unsecured (SECURITY-125)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205620
  [ 3 ] Bug #1205623 - CVE-2015-1808 jenkins: update center metadata retrieval DoS attack (SECURITY-163)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205623
  [ 4 ] Bug #1205627 - CVE-2015-1810 jenkins: HudsonPrivateSecurityRealm allows creation of reserved names (SECURITY-166)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205627
  [ 5 ] Bug #1205616 - CVE-2015-1814 jenkins: forced API token change (SECURITY-180)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205616
  [ 6 ] Bug #1205622 - CVE-2015-1807 jenkins: directory traversal from artifacts via symlink (SECURITY-162)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205622
  [ 7 ] Bug #1205625 - CVE-2015-1809 jenkins: external entity injection via XPath (SECURITY-165)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205625
  [ 8 ] Bug #1205632 - CVE-2015-1811 jenkins: External entity processing in XML can reveal sensitive local files (SECURITY-167)
        https://bugzilla.redhat.com/show_bug.cgi?id=1205632
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use
su -c 'yum update jenkins-executable-war' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list