Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1990623

Summary: CVEs for jenkins v4.6.0-202107230321.p0.git.4d96f05 rated as High
Product: OpenShift Container Platform Reporter: Dan Yocum <dyocum>
Component: JenkinsAssignee: Akram Ben Aissi <abenaiss>
Status: CLOSED DUPLICATE QA Contact: Jitendar Singh <jitsingh>
Severity: high Docs Contact:
Priority: unspecified    
Version: 4.6CC: adam.kaplan, aos-bugs, jkhelil, pbhattac
Target Milestone: ---   
Target Release: 4.6.z   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-08-19 16:32:16 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
jenkins screenshot none

Description Dan Yocum 2021-08-05 18:32:15 UTC
Created attachment 1811285 [details]
jenkins screenshot

Description of problem:

The default jenkins2 image for OCPv4.6 on the eus-4.6 channel contains at least 2 security vulnerabilities rated as HIGH by Jenkins:

CVE-2021-21672
CVE-2021-21671

https://www.jenkins.io/security/advisory/2021-06-30/

Version-Release number of selected component (if applicable):

v4.6.0-202107230321.p0.git.4d96f05 

How reproducible:

Always

Steps to Reproduce:
1. Deploy jenkin on EUS OCPv4.6

Actual results:

See attached screenshot.

Expected results:

Customers expect to launch jenkins on the eus-4.6 OCP release with no CVEs rated as Critical or Important.

Additional info:

Customers can not use OCPv4.8 Jenkins images on EUS OCPv4.6 clusters.

Comment 5 Adam Kaplan 2021-08-19 16:32:16 UTC
Marking this as a duplicate of 1972366 - an update to Jenkins 2.289.2 is in progress.

*** This bug has been marked as a duplicate of bug 1972366 ***