Jenkins Pipeline: Shared Groovy Libraries Plugin 564.ve62a_4eb_b_e039 and earlier, except 2.21.3, allows attackers able to submit pull requests (or equivalent), but not able to commit directly to the configured SCM, to effectively change the Pipeline behavior by changing the definition of a dynamically retrieved library in their pull request, even if the Pipeline is configured to not trust them. https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-1951
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2022:2205 https://access.redhat.com/errata/RHSA-2022:2205
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-29047
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.7 Via RHSA-2022:4909 https://access.redhat.com/errata/RHSA-2022:4909
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.8 Via RHSA-2023:0017 https://access.redhat.com/errata/RHSA-2023:0017
This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.12 Via RHSA-2023:1064 https://access.redhat.com/errata/RHSA-2023:1064