- Issued:
- 2023-10-30
- Updated:
- 2023-10-30
RHBA-2023:6174 - Bug Fix Advisory
Synopsis
Release of Bug Advisories for the OpenShift Jenkins and Jenkins agent base image
Type/Severity
Bug Fix Advisory
Topic
Release of Bug Advisories for the OpenShift Jenkins and Jenkins agent base image
Description
OpenShift Jenkins Bug Advisories
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- OpenShift Developer Tools and Services 4.12 x86_64
- OpenShift Developer Tools and Services 4.12 s390x
- OpenShift Developer Tools and Services 4.12 ppc64le
- OpenShift Developer Tools and Services 4.12 aarch64
Fixes
- OCPBUGS-13901 - [release-4.12] Bump Jenkins Plugins to latest version
- OCPBUGS-14113 - Update ImageStreams to use new Jenkins and Jenkins Agent Base images
- OCPBUGS-3692 - [release-4.12] Update OWNERS file to reflect current team members
- OCPBUGS-4833 - [release-4.12] openshift4/ose-jenkins:v4.10.0 run script throws too many arguments error
- OCPBUGS-7050 - Sync jenkins-version.txt, base-plugins.txt and bundle-plugins.txt from master branch
- OCPBUGS-8420 - Update Go to v1.18
- OCPBUGS-8497 - Jenkins images based on rhel8 are wrongly tagged with rhel7
- OCPTOOLS-246 - Bump Jenkins version to 2.414.3 [openshift-4.12]
CVEs
- CVE-2020-24736
- CVE-2022-40433
- CVE-2023-0800
- CVE-2023-0801
- CVE-2023-0802
- CVE-2023-0803
- CVE-2023-0804
- CVE-2023-1667
- CVE-2023-2283
- CVE-2023-2602
- CVE-2023-2603
- CVE-2023-3341
- CVE-2023-3899
- CVE-2023-4527
- CVE-2023-4806
- CVE-2023-4813
- CVE-2023-4911
- CVE-2023-22067
- CVE-2023-22081
- CVE-2023-27536
- CVE-2023-28321
- CVE-2023-28484
- CVE-2023-29469
- CVE-2023-29491
- CVE-2023-30630
- CVE-2023-32681
- CVE-2023-34969
- CVE-2023-38408
- CVE-2023-40217
- CVE-2023-44487
References
(none)
aarch64
ocp-tools-4/jenkins-agent-base-rhel8@sha256:f9588d7724f8cddc7581dfacc0b7f5838c476c7a173226afd7c814f9ea580253 |
ocp-tools-4/jenkins-rhel8@sha256:d5cae82b5d82dfb4aa3db95730d0a4a1c6dba80a52c21faeeeccc85999214c3a |
ppc64le
ocp-tools-4/jenkins-agent-base-rhel8@sha256:90341ea7a1a781088b9c3e85826f631f6251304afdb7c5d96ccf4652ad162f10 |
ocp-tools-4/jenkins-rhel8@sha256:78d4ee1e3063ded77fb9bfc3a3c88111ac79d8f709df72e66635e25bb5dec87f |
s390x
ocp-tools-4/jenkins-agent-base-rhel8@sha256:441fd5bfa2783a312681bd2c3d9dafb6be9ae3766b69974ef8a71a009f2798c7 |
ocp-tools-4/jenkins-rhel8@sha256:70f6c039cd29199350bb231d0258c75d546fb6f01276686e60951d30d2db8a0e |
x86_64
ocp-tools-4/jenkins-agent-base-rhel8@sha256:049e73975658ad6be558d8859f1b9a45764756cf084550b5fd2fb447ebeea009 |
ocp-tools-4/jenkins-rhel8@sha256:86d67f17252583968c9357b0848211877a99ae94fdc9dffb9830dd7d7b2ffee4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.