——————————————————————————–
Fedora Update Notification
FEDORA-2016-f7e7a6067d
2016-05-26 17:29:37.568836
——————————————————————————–
Name : jenkins
Product : Fedora 22
Version : 1.609.3
Release : 7.fc22
URL : http://jenkins-ci.org
Summary : An extendable open source continuous integration server
Description :
Jenkins is an award-winning application that monitors executions of repeated
jobs, such as building a software project or jobs run by cron. Among those
things, current Jenkins focuses on the following two jobs:
– building/testing software projects continuously. In a nutshell, Jenkins
provides an easy-to-use so-called continuous integration system, making it
easier for developers to integrate changes to the project, and making it
easier for users to obtain a fresh build. The automated, continuous build
increases the productivity.
– monitoring executions of externally-run jobs, such as cron jobs and procmail
jobs, even those that are run on a remote machine. For example, with cron, all
you receive is regular e-mails that capture the output, and it is up to you to
look at them diligently and notice when it broke. Jenkins keeps those outputs
and makes it easy for you to notice when something is wrong.
——————————————————————————–
Update Information:
Security fix for CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724,
CVE-2016-3725, CVE-2016-3726, CVE-2016-3727
——————————————————————————–
References:
[ 1 ] Bug #1335415 – CVE-2016-3721 jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170)
https://bugzilla.redhat.com/show_bug.cgi?id=1335415
[ 2 ] Bug #1335416 – CVE-2016-3722 jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243)
https://bugzilla.redhat.com/show_bug.cgi?id=1335416
[ 3 ] Bug #1335417 – CVE-2016-3723 jenkins: Information on installed plugins exposed via API (SECURITY-250)
https://bugzilla.redhat.com/show_bug.cgi?id=1335417
[ 4 ] Bug #1335418 – CVE-2016-3724 jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266)
https://bugzilla.redhat.com/show_bug.cgi?id=1335418
[ 5 ] Bug #1335420 – CVE-2016-3725 jenkins: Regular users can trigger download of update site metadata (SECURITY-273)
https://bugzilla.redhat.com/show_bug.cgi?id=1335420
[ 6 ] Bug #1335421 – CVE-2016-3726 jenkins: Open redirect to scheme-relative URLs (SECURITY-276)
https://bugzilla.redhat.com/show_bug.cgi?id=1335421
[ 7 ] Bug #1335422 – CVE-2016-3727 jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)
https://bugzilla.redhat.com/show_bug.cgi?id=1335422
——————————————————————————–
This update can be installed with the “yum” update program. Use
su -c ‘yum update jenkins’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-9ba53cf8a2
2016-05-26 17:29:38.375526
——————————————————————————–
Name : jenkins
Product : Fedora 23
Version : 1.625.3
Release : 4.fc23
URL : http://jenkins-ci.org
Summary : An extendable open source continuous integration server
Description :
Jenkins is an award-winning, cross-platform, continuous integration and
continuous delivery application that increases your productivity. Use
Jenkins to build and test your software projects continuously making it
easier for developers to integrate changes to the project, and making it
easier for users to obtain a fresh build. It also allows you to
continuously deliver your software by providing powerful ways to define
your build pipelines and integrating with a large number of testing and
deployment technologies.
——————————————————————————–
Update Information:
Security fix for CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724,
CVE-2016-3725, CVE-2016-3726, CVE-2016-3727
——————————————————————————–
References:
[ 1 ] Bug #1335415 – CVE-2016-3721 jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170)
https://bugzilla.redhat.com/show_bug.cgi?id=1335415
[ 2 ] Bug #1335416 – CVE-2016-3722 jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243)
https://bugzilla.redhat.com/show_bug.cgi?id=1335416
[ 3 ] Bug #1335417 – CVE-2016-3723 jenkins: Information on installed plugins exposed via API (SECURITY-250)
https://bugzilla.redhat.com/show_bug.cgi?id=1335417
[ 4 ] Bug #1335418 – CVE-2016-3724 jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266)
https://bugzilla.redhat.com/show_bug.cgi?id=1335418
[ 5 ] Bug #1335420 – CVE-2016-3725 jenkins: Regular users can trigger download of update site metadata (SECURITY-273)
https://bugzilla.redhat.com/show_bug.cgi?id=1335420
[ 6 ] Bug #1335421 – CVE-2016-3726 jenkins: Open redirect to scheme-relative URLs (SECURITY-276)
https://bugzilla.redhat.com/show_bug.cgi?id=1335421
[ 7 ] Bug #1335422 – CVE-2016-3727 jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)
https://bugzilla.redhat.com/show_bug.cgi?id=1335422
——————————————————————————–
This update can be installed with the “yum” update program. Use
su -c ‘yum update jenkins’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org