{"id":"RHSA-2016:1206","summary":"Red Hat Security Advisory: jenkins security update","modified":"2026-02-20T10:01:12Z","published":"2024-09-15T23:20:52Z","upstream":["CVE-2016-3721","CVE-2016-3722","CVE-2016-3723","CVE-2016-3724","CVE-2016-3725","CVE-2016-3726","CVE-2016-3727"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1206"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1333133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335415"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335416"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335422"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1206.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3721"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3721"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3721"},{"type":"ARTICLE","url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3722"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3722"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3722"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3723"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3723"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3724"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3724"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3725"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3725"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3725"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3726"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3726"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3726"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-3727"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-3727"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3727"}],"affected":[{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:3.1::el7","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.651.2-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1206.json"}},{"package":{"name":"jenkins-plugin-openshift-pipeline","ecosystem":"Red Hat:openshift:3.1::el7","purl":"pkg:rpm/redhat/jenkins-plugin-openshift-pipeline"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.12-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1206.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:3.2::el7","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.651.2-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1206.json"}},{"package":{"name":"jenkins-plugin-openshift-pipeline","ecosystem":"Red Hat:openshift:3.2::el7","purl":"pkg:rpm/redhat/jenkins-plugin-openshift-pipeline"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.12-1.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2016:1206.json"}}],"schema_version":"1.7.3"}