Our systems group removed some packages from our RHEL 6.10 server in order 
to remove the TSM Client.  It has caused our AD integration to quit 
working.  Which of the following dependencies are required for Jenkins 
version 2.138.2:

TIVsm-BA-6.4.2-3
TIVsm-filepath-6.4.2-0
TIVsm-API64-6.4.2-3
gskssl64-8.0-14.43
gskcrypt64-8.0-14.43

We're also getting all kinds of warnings in "Manage Jenkins" which I don't 
recall before the removal of these packages.  Could this be related?

You have data stored in an older format and/or unreadable data.
More InfoDismiss
It appears that your reverse proxy set up is broken.
New version of Jenkins (2.138.3) is available for download 
<http://updates.jenkins-ci.org/download/war/2.138.3/jenkins.war> (changelog 
<https://jenkins.io/changelog-stable>).
Disable CLI over RemotingDismiss
Allowing Jenkins CLI to work in -remoting mode is considered dangerous and 
usually unnecessary. You are advised to disable this mode. Please refer to 
the CLI documentation <https://jenkins.io/doc/book/managing/cli/> for 
details.
Go to plugin managerConfigure which of these warnings are shown
Warnings have been published for the following currently installed 
components.Pipeline: Groovy 2.11 
<https://wiki.jenkins-ci.org/display/JENKINS/Pipeline+Groovy+Plugin>Arbitrary 
code execution due to incomplete sandbox protection 
<https://jenkins.io/security/advisory/2017-07-10/>Script Security sandbox 
bypass <https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186>JUnit 
Plugin 1.18 <http://wiki.jenkins-ci.org/display/JENKINS/JUnit+Plugin>XML 
External Entity (XXE) processing vulnerability 
<https://jenkins.io/security/advisory/2018-02-05/>CSRF vulnerability 
<https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1101>GitHub 
Branch Source Plugin 1.8.1 
<https://wiki.jenkins-ci.org/display/JENKINS/GitHub+Branch+Source+Plugin>CSRF 
vulnerability and insufficient permission checks allow capturing credentials 
<https://jenkins.io/security/advisory/2017-07-10/>Users with Overall/Read 
access can enumerate credential IDs 
<https://jenkins.io/security/advisory/2017-07-10/>Server-side request 
forgery 
<https://jenkins.io/security/advisory/2018-06-04/#SECURITY-806>Rebuilder 
1.25 <http://wiki.jenkins-ci.org/display/JENKINS/Rebuild+Plugin>Cross Site 
Scripting vulnerability 
<https://jenkins.io/security/advisory/2018-09-25/#SECURITY-130>Pipeline: 
Input Step 2.1 
<https://wiki.jenkins-ci.org/display/JENKINS/Pipeline+Input+Step+Plugin>Users 
with read access could interact with input step by default 
<https://jenkins.io/security/advisory/2017-08-07/>Pipeline: Nodes and 
Processes 2.4 
<https://wiki.jenkins-ci.org/display/JENKINS/Pipeline+Nodes+and+Processes+Plugin>Incorrect
 
permission checks allow executing builds on agents without Computer/Build 
permission <https://jenkins.io/security/advisory/2018-01-22/>Groovy 1.29 
<http://wiki.jenkins-ci.org/display/JENKINS/Groovy+plugin>Arbitrary code 
execution vulnerability 
<https://jenkins.io/security/advisory/2017-04-10/>Pipeline: 
Build Step 2.2 
<https://wiki.jenkins-ci.org/display/JENKINS/Pipeline+Build+Step+Plugin>Missing 
permission check allows building all jobs 
<https://jenkins.io/security/advisory/2017-07-10/>Pipeline: Supporting APIs 
2.2 
<https://wiki.jenkins-ci.org/display/JENKINS/Pipeline+Supporting+APIs+Plugin>Arbitrary
 
code execution due to incomplete sandbox protection 
<https://jenkins.io/security/advisory/2018-02-05/>Git client plugin 1.19.7 
<http://wiki.jenkins-ci.org/display/JENKINS/Git+Client+Plugin>Creation of 
temporary file with insecure permissions 
<https://jenkins.io/security/advisory/2017-04-27/>Git plugin 2.5.3 
<http://wiki.jenkins-ci.org/display/JENKINS/Git+Plugin>Server-side request 
forgery <https://jenkins.io/security/advisory/2018-06-04/#SECURITY-810>Users 
without Overall/Read are able to access lists of user names and node names 
<https://jenkins.io/security/advisory/2018-02-26/#SECURITY-723>CSRF 
vulnerability in Git plugin allows capturing credentials 
<https://jenkins.io/security/advisory/2017-07-10/>SSH Credentials Plugin 
1.12 
<http://wiki.jenkins-ci.org/display/JENKINS/SSH+Credentials+Plugin>Arbitrary 
file read vulnerability with Credentials Binding Plugin 1.13 or newer 
<https://jenkins.io/security/advisory/2018-06-25/#SECURITY-440>Script 
Security Plugin 1.21 
<https://wiki.jenkins-ci.org/display/JENKINS/Script+Security+Plugin>Unsafe 
entries in default whitelist 
<https://jenkins.io/security/advisory/2017-07-10/>Multiple sandbox bypasses 
<https://jenkins.io/security/advisory/2017-08-07/>Script Security sandbox 
bypass 
<https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186>Arbitrary 
file read vulnerability 
<https://jenkins.io/security/advisory/2017-12-11/>Matrix 
Authorization Strategy Plugin 1.4 
<http://wiki.jenkins-ci.org/display/JENKINS/Matrix+Authorization+Strategy+Plugin>Dangerous
 
permissions can be configured independently of Administer permission 
<https://jenkins.io/security/advisory/2017-04-10/>GitHub plugin 1.20.0 
<http://wiki.jenkins-ci.org/display/JENKINS/Github+Plugin>Server-side 
request forgery 
<https://jenkins.io/security/advisory/2018-06-04/#SECURITY-799>CSRF 
vulnerability and insufficient permission checks allow capturing credentials 
<https://jenkins.io/security/advisory/2018-06-25/#SECURITY-915>CSRF 
vulnerability and lack of permission checks allows capturing credentials 
<https://jenkins.io/security/advisory/2018-06-04/#SECURITY-804>Mailer 
Plugin 1.20 <https://wiki.jenkins-ci.org/display/JENKINS/Mailer>Unauthorized 
users able to send test emails 
<https://jenkins.io/security/advisory/2018-03-26/#SECURITY-774>SSH Slaves 
plugin 1.11 
<http://wiki.jenkins-ci.org/display/JENKINS/SSH+Slaves+plugin>Man-in-the-middle 
vulnerability due to missing host key verification 
<https://jenkins.io/security/advisory/2017-03-20/>Subversion Plug-in 2.6 
<http://wiki.jenkins-ci.org/display/JENKINS/Subversion+Plugin>CSRF 
vulnerability and insufficient permission checks allow capturing credentials 
<https://jenkins.io/security/advisory/2017-07-10/>Users without 
Overall/Read are able to access lists of user names and node names 
<https://jenkins.io/security/advisory/2018-02-26/#SECURITY-724>Parameterized 
Trigger plugin 2.32 
<http://wiki.jenkins-ci.org/display/JENKINS/Parameterized+Trigger+Plugin>Missing
 
permission check allows building all jobs 
<https://jenkins.io/security/advisory/2017-07-10/>Translation Assistance 
plugin 1.15 
<https://wiki.jenkins-ci.org/display/JENKINS/Translation+Assistance+Plugin>Cross-site
 
request forgery (CSRF) vulnerability 
<https://jenkins.io/security/advisory/2018-01-22/>Groovy Postbuild 2.3.1 
<http://wiki.jenkins-ci.org/display/JENKINS/Groovy+Postbuild+Plugin>Persisted 
cross-site scripting vulnerability in build badges 
<https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821>Credentials 
Binding Plugin 1.8 
<http://wiki.jenkins-ci.org/display/JENKINS/Credentials+Binding+Plugin>Improper 
masking of secrets in rare circumstances 
<https://jenkins.io/security/advisory/2018-02-05/>Environment Injector 
Plugin 1.92.1 
<https://wiki.jenkins-ci.org/display/JENKINS/EnvInject+Plugin>Arbitrary 
code execution vulnerability 
<https://jenkins.io/security/advisory/2017-04-10/>Low privilege users are 
able to read parts of some files on master 
<https://jenkins.io/security/advisory/2017-04-10/>Exposure of sensitive 
build variables stored by EnvInject 1.90 and earlier 
<https://jenkins.io/security/advisory/2018-02-26/#SECURITY-248>PAM 
Authentication plugin 1.3 
<http://wiki.jenkins-ci.org/display/JENKINS/PAM+Authentication+Plugin>Improper 
user account validation 
<https://jenkins.io/security/advisory/2018-09-25/#SECURITY-813>Email 
Extension Plugin 2.47 
<http://wiki.jenkins-ci.org/display/JENKINS/Email-ext+plugin>Arbitrary code 
execution vulnerability <https://jenkins.io/security/advisory/2017-04-10/>Email 
notifications could be sent to people who are not users of Jenkins 
<https://jenkins.io/security/advisory/2017-03-20/>SMTP password gets 
transmitted in unencrypted form 
<https://jenkins.io/security/advisory/2018-04-16/#SECURITY-729>Active 
Directory plugin 1.47 
<http://wiki.jenkins-ci.org/display/JENKINS/Active+Directory+Plugin>Man-in-the-middle
 
vulnerability due to missing certificate check 
<https://jenkins.io/security/advisory/2017-03-20/>
There are users who are still using a legacy API token. That system is not 
as secure as the new one because it stores the token in a recoverable 
manner on the disk. 
See list of impacted users 
<http://nd201bd001.fireness.gov:8080/administrativeMonitor/legacyApiToken/manage>
.
ExamineDismiss
Agent to master security subsystem is currently off. Please read the 
documentation <https://jenkins.io/redirect/security-144> and consider 
turning it on.

Thanks,
Eric

-- 
You received this message because you are subscribed to the Google Groups 
"Jenkins Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-users/434e8af1-aec6-4026-880a-39dbd13b54b2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to