[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Multiple vulnerabilities in Jenkins
From:       Daniel Beck <ml () beckweb ! net>
Date:       2017-12-14 3:10:26
Message-ID: 61F736A2-A375-45DD-9137-12B53BF9A228 () beckweb ! net
[Download RAW message or body]

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:

* Jenkins (weekly) 2.95
* Jenkins (LTS) 2.89.2

Descriptions of the vulnerabilities are below. Some more details, 
severity, and attribution can be found here:
https://jenkins.io/security/advisory/2017-12-14/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-667
A race condition during Jenkins startup could result in the wrong order of
execution of commands during initialization.

On Jenkins 2.81 and newer, including LTS 2.89.1, this could in rare cases
(we estimate less than 20% of new instances) result in failure to
initialize the setup wizard on the first startup. This resulted in multiple
security-related settings not being set to their usual strict default.
Affected instances need to be configured to restrict access.

Additionally, there's a very short window of time after startup during
which Jenkins may no longer show the "Please wait while Jenkins is getting
ready to work" message, but Cross-Site Request Forgery (CSRF) protection
may not yet be effective. As of publication of this advisory, we've been
unable to confirm this can actually be exploited, but generally recommend
that users upgrade their instances.

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic