First published: Wed Aug 24 2016(Updated: )
OpenShift Enterprise by Red Hat is the company's cloud computing<br>Platform-as-a-Service (PaaS) solution designed for on-premise or<br>private cloud deployments.<br><li> The Jenkins continuous integration server has been updated to upstream </li> version 1.651.2 LTS that addresses a large number of security issues, <br>including open redirects, a potential denial of service, unsafe handling of<br>user provided environment variables and several instances of sensitive <br>information disclosure. (CVE-2014-3577, CVE-2016-0788, CVE-2016-0789,<br>CVE-2016-0790, CVE-2016-0791, CVE-2016-0792, CVE-2016-3721, CVE-2016-3722,<br>CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727,<br>CVE-2015-7501)<br>Space precludes documenting all of the bug fixes and enhancements in this <br>advisory. See the OpenShift Enterprise Technical Notes, which will be <br>updated shortly for release 2.2.10, for details about these changes:<br><a href="https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html" target="_blank">https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html</a> All OpenShift Enterprise 2 users are advised to upgrade to these updated <br>packages.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/activemq | <5.9.0-6.redhat.611463.el6 | 5.9.0-6.redhat.611463.el6 |
redhat/openshift-origin-broker | <1.16.3.2-1.el6 | 1.16.3.2-1.el6 |
redhat/openshift-origin-broker-util | <1.37.6.2-1.el6 | 1.37.6.2-1.el6 |
redhat/rubygem-openshift-origin-admin-console | <1.28.2.1-1.el6 | 1.28.2.1-1.el6 |
redhat/rubygem-openshift-origin-controller | <1.38.6.4-1.el6 | 1.38.6.4-1.el6 |
redhat/rubygem-openshift-origin-msg-broker-mcollective | <1.36.2.4-1.el6 | 1.36.2.4-1.el6 |
redhat/rubygem-openshift-origin-routing-daemon | <0.26.6.1-1.el6 | 0.26.6.1-1.el6 |
redhat/activemq-client | <5.9.0-6.redhat.611463.el6 | 5.9.0-6.redhat.611463.el6 |
redhat/jenkins | <1.651.2-1.el6 | 1.651.2-1.el6 |
redhat/libcgroup | <0.40.rc1-18.el6_8 | 0.40.rc1-18.el6_8 |
redhat/openshift-origin-cartridge-cron | <1.25.4.2-1.el6 | 1.25.4.2-1.el6 |
redhat/openshift-origin-cartridge-diy | <1.26.2.2-1.el6 | 1.26.2.2-1.el6 |
redhat/openshift-origin-cartridge-haproxy | <1.31.6.2-1.el6 | 1.31.6.2-1.el6 |
redhat/openshift-origin-cartridge-jbossews | <1.35.5.2-1.el6 | 1.35.5.2-1.el6 |
redhat/openshift-origin-cartridge-jenkins | <1.29.2.2-1.el6 | 1.29.2.2-1.el6 |
redhat/openshift-origin-cartridge-jenkins-client | <1.26.1.1-1.el6 | 1.26.1.1-1.el6 |
redhat/openshift-origin-cartridge-mongodb | <1.26.2.2-1.el6 | 1.26.2.2-1.el6 |
redhat/openshift-origin-cartridge-mysql | <1.31.3.3-1.el6 | 1.31.3.3-1.el6 |
redhat/openshift-origin-cartridge-nodejs | <1.33.1.2-1.el6 | 1.33.1.2-1.el6 |
redhat/openshift-origin-cartridge-perl | <1.30.2.2-1.el6 | 1.30.2.2-1.el6 |
redhat/openshift-origin-cartridge-php | <1.35.4.2-1.el6 | 1.35.4.2-1.el6 |
redhat/openshift-origin-cartridge-python | <1.34.3.2-1.el6 | 1.34.3.2-1.el6 |
redhat/openshift-origin-cartridge-ruby | <1.32.2.2-1.el6 | 1.32.2.2-1.el6 |
redhat/openshift-origin-msg-node-mcollective | <1.30.2.2-1.el6 | 1.30.2.2-1.el6 |
redhat/openshift-origin-node-proxy | <1.26.3.1-1.el6 | 1.26.3.1-1.el6 |
redhat/openshift-origin-node-util | <1.38.7.1-1.el6 | 1.38.7.1-1.el6 |
redhat/rubygem-openshift-origin-frontend-haproxy-sni-proxy | <0.5.2.1-1.el6 | 0.5.2.1-1.el6 |
redhat/rubygem-openshift-origin-node | <1.38.6.4-1.el6 | 1.38.6.4-1.el6 |
redhat/libcgroup-debuginfo | <0.40.rc1-18.el6_8 | 0.40.rc1-18.el6_8 |
redhat/libcgroup-pam | <0.40.rc1-18.el6_8 | 0.40.rc1-18.el6_8 |
redhat/rhc | <1.38.7.1-1.el6 | 1.38.7.1-1.el6 |
redhat/openshift-origin-cartridge-jbosseap | <2.27.4.2-1.el6 | 2.27.4.2-1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:1773 is rated as important.
To fix RHSA-2016:1773, update the affected Red Hat packages to their recommended versions.
RHSA-2016:1773 affects various packages including jenkins, activemq, and openshift-origin components.
Yes, RHSA-2016:1773 addresses security vulnerabilities in the Jenkins continuous integration server.
The update version for jenkins in RHSA-2016:1773 is 1.651.2-1.el6.