Security Advisory Impact
CloudBees Security Advisory 2021-12-01
This advisory announces vulnerabilities in CloudBees Jenkins Platform and CloudBees CI
Commons compress [CVE-2021-35517]
A malicious user could inject a crafted tar file that may impact the availability of the instance, even reaching an OOM (out of memory error).
The library has been updated in Jenkins core to fix this issue.
JSoup vulnerability CVE-2021-37714 in cloudbees-update-center-plugin
cloudbees-update-center-plugin v4.64 and previous version contains a vulnerable version of JSoup (CVE-2021-37714).
cloudbees-update-center-plugin has been updated to update JSoup to remove such a vulnerability.
CloudBees Traditional Platforms should be upgraded to 2.303.3.3 or 2.319.1.5
CloudBees Cloud Platforms should be upgraded to 2.303.3.3 or 2.319.1.5
CloudBees Jenkins Enterprise should be upgraded to 2.303.3.3 or 2.319.1.5 the Managed Masters and Operations Center
CloudBees Jenkins Platform (rolling train, CJP Operations Center and CJP Client Master (2.x.y.z)) should be upgraded to 2.303.3.3 or 2.319.1.5 version
CloudBees Jenkins Platform (fixed train, CJP Operations Center and CJP Client Master (2.277.x.0.z)) should be upgraded to 2.2188.8.131.52 version
cloudbees-update-center Plugin should be updated to version 4.59.1, or 4.65 or higher