Moderate: OpenShift Jenkins image and Jenkins agent base image security update

Synopsis

Moderate: OpenShift Jenkins image and Jenkins agent base image security update

Type/Severity

Security Advisory: Moderate

Topic

Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base image.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.

Security Fix(es):

  • golang: net/http: An attacker can cause excessive memory growth in a Go

server accepting HTTP/2 requests (CVE-2022-41717)

  • golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
  • golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
  • golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
  • golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
  • golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • OpenShift Developer Tools and Services 4.11 x86_64
  • OpenShift Developer Tools and Services 4.11 s390x
  • OpenShift Developer Tools and Services 4.11 ppc64le
  • OpenShift Developer Tools and Services 4.11 aarch64

Fixes

  • BZ - 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
  • BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
  • BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
  • BZ - 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
  • BZ - 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps
  • BZ - 2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
  • OCPBUGS-11182 - Jenkins images based on rhel8 are wrongly tagged with rhel7
  • OCPBUGS-13653 - [release-4.11] Bump Jenkins and Plugin versions
  • OCPBUGS-14114 - Update ImageStreams to use new Jenkins and Jenkins Agent Base images
  • OCPBUGS-1438 - [release-411] Jenkins install-plugins script does not ignore updates to locked plugin versions
  • OCPBUGS-14646 - Bump Jenkins plugins to latest versions