Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Feb 2017 16:54:03 +0000 (UTC)
From:      Li-Wen Hsu <lwhsu@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r433049 - head/security/vuxml
Message-ID:  <201702011654.v11Gs3vq077651@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: lwhsu
Date: Wed Feb  1 16:54:03 2017
New Revision: 433049
URL: https://svnweb.freebsd.org/changeset/ports/433049

Log:
  Document Jenkins Security Advisory 2017-02-01

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Feb  1 16:51:30 2017	(r433048)
+++ head/security/vuxml/vuln.xml	Wed Feb  1 16:54:03 2017	(r433049)
@@ -58,6 +58,89 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="5cfa9d0c-73d7-4642-af4f-28fbed9e9404">
+    <topic>jenkins -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>jenkins</name>
+	<range><lt>2.44</lt></range>
+      </package>
+      <package>
+	<name>jenkins-lts</name>
+	<range><lt>2.32.2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jenkins Security Advisory:</p>
+	<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2017-02-01">;
+	  <h1>Description</h1>
+	  <h5>SECURITY-304 / CVE-2017-2598</h5>
+	  <p>Use of AES ECB block cipher mode without IV for encrypting secrets</p>
+	  <h5>SECURITY-321 / CVE-2017-2599</h5>
+	  <p>Items could be created with same name as existing item</p>
+	  <h5>SECURITY-343 / CVE-2017-2600</h5>
+	  <p>Node monitor data could be viewed by low privilege users</p>
+	  <h5>SECURITY-349 / CVE-2011-4969</h5>
+	  <p>Possible cross-site scripting vulnerability in jQuery bundled with timeline widget</p>
+	  <h5>SECURITY-353 / CVE-2017-2601</h5>
+	  <p>Persisted cross-site scripting vulnerability in parameter names and descriptions</p>
+	  <h5>SECURITY-354 / CVE-2015-0886</h5>
+	  <p>Outdated jbcrypt version bundled with Jenkins</p>
+	  <h5>SECURITY-358 / CVE-2017-2602</h5>
+	  <p>Pipeline metadata files not blacklisted in agent-to-master security subsystem</p>
+	  <h5>SECURITY-362 / CVE-2017-2603</h5>
+	  <p>User data leak in disconnected agents' config.xml API</p>
+	  <h5>SECURITY-371 / CVE-2017-2604</h5>
+	  <p>Low privilege users were able to act on administrative monitors</p>
+	  <h5>SECURITY-376 / CVE-2017-2605</h5>
+	  <p>Re-key admin monitor leaves behind unencrypted credentials in upgraded installations</p>
+	  <h5>SECURITY-380 / CVE-2017-2606</h5>
+	  <p>Internal API allowed access to item names that should not be visible</p>
+	  <h5>SECURITY-382 / CVE-2017-2607</h5>
+	  <p>Persisted cross-site scripting vulnerability in console notes</p>
+	  <h5>SECURITY-383 / CVE-2017-2608</h5>
+	  <p>XStream remote code execution vulnerability</p>
+	  <h5>SECURITY-385 / CVE-2017-2609</h5>
+	  <p>Information disclosure vulnerability in search suggestions</p>
+	  <h5>SECURITY-388 / CVE-2017-2610</h5>
+	  <p>Persisted cross-site scripting vulnerability in search suggestions</p>
+	  <h5>SECURITY-389 / CVE-2017-2611</h5>
+	  <p>Insufficient permission check for periodic processes</p>
+	  <h5>SECURITY-392 / CVE-2017-2612</h5>
+	  <p>Low privilege users were able to override JDK download credentials</p>
+	  <h5>SECURITY-406 / CVE-2017-2613</h5>
+	  <p>User creation CSRF using GET by admins</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2017-2598</cvename>
+      <cvename>CVE-2017-2599</cvename>
+      <cvename>CVE-2017-2600</cvename>
+      <cvename>CVE-2011-4969</cvename>
+      <cvename>CVE-2017-2601</cvename>
+      <cvename>CVE-2015-0886</cvename>
+      <cvename>CVE-2017-2602</cvename>
+      <cvename>CVE-2017-2603</cvename>
+      <cvename>CVE-2017-2604</cvename>
+      <cvename>CVE-2017-2605</cvename>
+      <cvename>CVE-2017-2606</cvename>
+      <cvename>CVE-2017-2607</cvename>
+      <cvename>CVE-2017-2608</cvename>
+      <cvename>CVE-2017-2609</cvename>
+      <cvename>CVE-2017-2610</cvename>
+      <cvename>CVE-2017-2611</cvename>
+      <cvename>CVE-2017-2612</cvename>
+      <cvename>CVE-2017-2613</cvename>
+      <url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2017-02-01</url>;
+    </references>
+    <dates>
+      <discovery>2017-02-01</discovery>
+      <entry>2017-02-01</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="14ea4458-e5cd-11e6-b56d-38d547003487">
     <topic>wordpress -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201702011654.v11Gs3vq077651>