Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Mar 2023 16:35:27 GMT
From:      Li-Wen Hsu <lwhsu@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: ef50a6277496 - main - security/vuxml: Document Jenkins Security Advisory 2023-03-08
Message-ID:  <202303091635.329GZRDI030894@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by lwhsu:

URL: https://cgit.FreeBSD.org/ports/commit/?id=ef50a6277496459f96eff8bb96287995511ad5d4

commit ef50a6277496459f96eff8bb96287995511ad5d4
Author:     Li-Wen Hsu <lwhsu@FreeBSD.org>
AuthorDate: 2023-03-09 16:32:14 +0000
Commit:     Li-Wen Hsu <lwhsu@FreeBSD.org>
CommitDate: 2023-03-09 16:35:07 +0000

    security/vuxml: Document Jenkins Security Advisory 2023-03-08
    
    Sponsored by:   The FreeBSD Foundation
---
 security/vuxml/vuln/2023.xml | 48 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 48 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index d02ae8240a4f..bfbaf05bc2e0 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,51 @@
+  <vuln vid="f68bb358-be8e-11ed-9215-00e081b7aa2d">
+    <topic>jenkins -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>jenkins</name>
+	<range><lt>2.394</lt></range>
+      </package>
+      <package>
+	<name>jenkins-lts</name>
+	<range><lt>2.387.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jenkins Security Advisory:</p>
+	<blockquote cite="https://www.jenkins.io/security/advisory/2023-03-08/">;
+	  <h1>Description</h1>
+	  <h5>(High) SECURITY-3037 / CVE-2023-27898</h5>
+	  <p>XSS vulnerability in plugin manager</p>
+	  <h5>(Medium) SECURITY-3030 / CVE-2023-24998 (upstream issue), CVE-2023-27900 (MultipartFormDataParser), CVE-2023-27901 (StaplerRequest)</h5>
+	  <p>DoS vulnerability in bundled Apache Commons FileUpload library</p>
+	  <h5></h5>
+	  <h5>(Medium) SECURITY-1807 / CVE-2023-27902</h5>
+	  <p>Workspace temporary directories accessible through directory browser</p>
+	  <h5>(Low) SECURITY-3058 / CVE-2023-27903</h5>
+	  <p>Temporary file parameter created with insecure permissions</p>
+	  <h5>(Low) SECURITY-2120 / CVE-2023-27904</h5>
+	  <p>Information disclosure through error stack traces related to agents</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2023-27898</cvename>
+      <cvename>CVE-2023-24998</cvename>
+      <cvename>CVE-2023-27900</cvename>
+      <cvename>CVE-2023-27901</cvename>
+      <cvename>CVE-2023-27902</cvename>
+      <cvename>CVE-2023-27903</cvename>
+      <cvename>CVE-2023-27904</cvename>
+      <cvename></cvename>
+      <url>https://www.jenkins.io/security/advisory/2023-03-08/</url>;
+    </references>
+    <dates>
+      <discovery>2023-03-08</discovery>
+      <entry>2023-03-09</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="742279d6-bdbe-11ed-a179-2b68e9d12706">
     <topic>go -- crypto/elliptic: incorrect P-256 ScalarMult and ScalarBaseMult results</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202303091635.329GZRDI030894>