RHSA-2025:23491
Vulnerability from csaf_redhat - Published: 2025-12-17 13:43 - Updated: 2025-12-17 14:50Summary
Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.
Notes
Topic
An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20.
Details
Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:23491",
"url": "https://access.redhat.com/errata/RHSA-2025:23491"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4949",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-67635",
"url": "https://access.redhat.com/security/cve/CVE-2025-67635"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23491.json"
}
],
"title": "Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update.",
"tracking": {
"current_release_date": "2025-12-17T14:50:25+00:00",
"generator": {
"date": "2025-12-17T14:50:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:23491",
"initial_release_date": "2025-12-17T13:43:49+00:00",
"revision_history": [
{
"date": "2025-12-17T13:43:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-17T13:43:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T14:50:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services 4.2",
"product": {
"name": "OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.20::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Developer Tools and Services"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868580"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868606"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868580"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3Ac19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868606"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868580"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868606"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-agent-base-rhel9@sha256%3A7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868580"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"product": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"product_id": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jenkins-rhel9@sha256%3A639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4\u0026tag=v4.20.0-1765868606"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64 as a component of OpenShift Developer Tools and Services 4.2",
"product_id": "OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
},
"product_reference": "registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64",
"relates_to_product_reference": "OpenShift Developer Tools and Services 4.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4949",
"cwe": {
"id": "CWE-827",
"name": "Improper Control of Document Type Definition"
},
"discovery_date": "2025-05-21T07:00:48.762597+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2367730"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse JGit. This vulnerability can allow information disclosure, denial of service, and other security issues when parsing XML files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4949"
},
{
"category": "external",
"summary": "RHBZ#2367730",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367730"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4949"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/64"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281",
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/281"
},
{
"category": "external",
"summary": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1",
"url": "https://projects.eclipse.org/projects/technology.jgit/releases/7.2.1"
}
],
"release_date": "2025-05-21T06:47:19.777000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T13:43:49+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23491"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.eclipse.jgit: XXE vulnerability in Eclipse JGit"
},
{
"cve": "CVE-2025-67635",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2025-12-10T17:01:24.450765+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2420998"
}
],
"notes": [
{
"category": "description",
"text": "Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly close HTTP-based CLI connections when the connection stream becomes corrupted, allowing unauthenticated attackers to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.jenkins-ci.main/jenkins-core: Jenkins HTTP connection mis-handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
],
"known_not_affected": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-67635"
},
{
"category": "external",
"summary": "RHBZ#2420998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420998"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-67635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-67635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67635"
},
{
"category": "external",
"summary": "https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-3630",
"url": "https://www.jenkins.io/security/advisory/2025-12-10/#SECURITY-3630"
}
],
"release_date": "2025-12-10T16:50:35.491000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-17T13:43:49+00:00",
"details": "It is recommended that existing users of Red Hat OpenShift Developer Tools - OpenShift Jenkins 4.20 upgrade to the latest. This update includes a newer OpenShift client (oc) version bundled in the image. If your Jenkins pipelines require a specific oc version, configure it explicitly using the Jenkins pipeline tools directive.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:23491"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:12c117246b5ed9075aad4a5970015d36de17812abedec9e986ede54c9f9a944e_arm64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:50021e5ceb2ff7baf42b44e3ea6cd7f39f73d45ab8accea976b59758acacf47c_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:7ea6ed80a8ce7410d3b1abb73e575e664d3c17ea7cf6eacf852d871d4858e241_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel9@sha256:9c9bc46e0370e9ae895474f85ae374d2b69a35402615fa6f6cec196a73e340a7_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:60063737604433397462efda8ba499016bfe5fb8400a3eb29e3daac5a098a7ed_ppc64le",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:639855931c885c92feff9578f03cc426fb548f15721d1231227332300d90e0ad_s390x",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:824b0151835492c9b41077491419b938c8d231ed80208cd99b3d5fa8e206c3fb_amd64",
"OpenShift Developer Tools and Services 4.2:registry.redhat.io/ocp-tools-4/jenkins-rhel9@sha256:c19b9a5471b0b496011fadb920a099a20b918ec326693e0ae5b2b306d2c7a57b_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.jenkins-ci.main/jenkins-core: Jenkins HTTP connection mis-handling"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…