Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 4 Nov 2021 14:52:27 GMT
From:      Li-Wen Hsu <lwhsu@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: c5bb74d2a31b - main - security/vuxml: Document Jenkins Security Advisory 2021-11-04
Message-ID:  <202111041452.1A4EqRbK009810@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by lwhsu:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c5bb74d2a31b90f332050832311a96e03e333280

commit c5bb74d2a31b90f332050832311a96e03e333280
Author:     Li-Wen Hsu <lwhsu@FreeBSD.org>
AuthorDate: 2021-11-04 14:52:01 +0000
Commit:     Li-Wen Hsu <lwhsu@FreeBSD.org>
CommitDate: 2021-11-04 14:52:01 +0000

    security/vuxml: Document Jenkins Security Advisory 2021-11-04
    
    Sponsored by:   The FreeBSD Foundation
---
 security/vuxml/vuln-2021.xml | 51 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 51 insertions(+)

diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index d3c71fff6573..75d1dfcb6bb8 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,54 @@
+  <vuln vid="2bf56269-90f8-4a82-b82f-c0e289f2a0dc">
+    <topic>jenkins -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>jenkins</name>
+	<range><lt>2.319</lt></range>
+      </package>
+      <package>
+	<name>jenkins-lts</name>
+	<range><lt>2.303.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jenkins Security Advisory:</p>
+	<blockquote cite="https://www.jenkins.io/security/advisory/2021-11-04/">;
+	  <h1>Description</h1>
+	  <h5>(Critical) SECURITY-2455 / CVE-2021-21685, CVE-2021-21686, CVE-2021-21687, CVE-2021-21688, CVE-2021-21689, CVE-2021-21690, CVE-2021-21691, CVE-2021-21692, CVE-2021-21693, CVE-2021-21694, CVE-2021-21695</h5>
+	  <p>Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control</p>
+	  <h5>(High) SECURITY-2423 / CVE-2021-21696</h5>
+	  <p>Agent-to-controller access control allowed writing to sensitive directory used by Pipeline: Shared Groovy Libraries Plugin</p>
+	  <h5>(High) SECURITY-2428 / CVE-2021-21697</h5>
+	  <p>Agent-to-controller access control allows reading/writing most content of build directories</p>
+	  <h5>(Medium) SECURITY-2506 / CVE-2021-21698</h5>
+	  <p>Path traversal vulnerability in Subversion Plugin allows reading arbitrary files</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2021-21685</cvename>
+      <cvename>CVE-2021-21686</cvename>
+      <cvename>CVE-2021-21687</cvename>
+      <cvename>CVE-2021-21688</cvename>
+      <cvename>CVE-2021-21689</cvename>
+      <cvename>CVE-2021-21690</cvename>
+      <cvename>CVE-2021-21691</cvename>
+      <cvename>CVE-2021-21692</cvename>
+      <cvename>CVE-2021-21693</cvename>
+      <cvename>CVE-2021-21694</cvename>
+      <cvename>CVE-2021-21695</cvename>
+      <cvename>CVE-2021-21696</cvename>
+      <cvename>CVE-2021-21697</cvename>
+      <cvename>CVE-2021-21698</cvename>
+      <url>https://www.jenkins.io/security/advisory/2021-11-04/</url>;
+    </references>
+    <dates>
+      <discovery>2021-11-04</discovery>
+      <entry>2021-11-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="df794e5d-3975-11ec-84e8-0800273f11ea">
     <topic>gitea -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202111041452.1A4EqRbK009810>