First published: Tue Nov 05 2024(Updated: )
Important: Red Hat Product OCP Tools 4.12 Openshift Jenkins security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Developer Tools and Services | ||
redhat/jenkins | <2-plugins-4.12.1730119231-1.el8 | 2-plugins-4.12.1730119231-1.el8 |
redhat/jenkins | <2.462.3.1730119132-3.el8 | 2.462.3.1730119132-3.el8 |
redhat/jenkins | <2-plugins-4.12.1730119231-1.el8 | 2-plugins-4.12.1730119231-1.el8 |
redhat/jenkins | <2.462.3.1730119132-3.el8 | 2.462.3.1730119132-3.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:8886 is classified as important.
To fix RHSA-2024:8886, update the jenkins packages to the specified versions in the advisory.
RHSA-2024:8886 affects Red Hat OpenShift Developer Tools and Services and specific jenkins packages on Red Hat Enterprise Linux 8.
RHSA-2024:8886 addresses the exposure of multi-line strings within Jenkins.
Yes, upgrading to jenkins 2-plugins-4.12.1730119231-1.el8 or 2.462.3.1730119132-3.el8 is recommended.