A vulnerability was found in Jenkins Pipeline: Groovy Plugin 2.78 and earlier, where sandbox protection can be circumvented through default parameter expressions in CPS-transformed methods. Reference: http://www.openwall.com/lists/oss-security/2020/02/12/3
External References: https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1710
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:2478 https://access.redhat.com/errata/RHSA-2020:2478
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-2109
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.4 Via RHSA-2020:2737 https://access.redhat.com/errata/RHSA-2020:2737
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.3 Via RHSA-2020:3616 https://access.redhat.com/errata/RHSA-2020:3616