A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.67 and earlier related to the handling of default parameter expressions in closures allowed attackers to execute arbitrary code in sandboxed scripts. Reference: http://www.openwall.com/lists/oss-security/2019/11/21/1
Created jenkins-script-security-plugin tracking bugs for this issue: Affects: fedora-30 [bug 1819654]
External References: https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1658
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 3.11 Via RHSA-2020:2478 https://access.redhat.com/errata/RHSA-2020:2478
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-16538
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.4 Via RHSA-2020:2737 https://access.redhat.com/errata/RHSA-2020:2737
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.3 Via RHSA-2020:3616 https://access.redhat.com/errata/RHSA-2020:3616