Skip to content

Commit 71bc7ec

Browse files
committed
2.27.1 was missing a CVE reference link
Inlined the reference to release anouncements to avoid duplicate information
1 parent a6fcf5c commit 71bc7ec

6 files changed

+32
-20
lines changed

_posts/2024-06-18-geoserver-2-24-4-released.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ This release addresses security vulnerabilities and is considered an essential u
4040
* [CVE-2024-29198](https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw) Unauthenticated SSRF via TestWfsPost (High)
4141
[CVE-2021-40822](https://github.com/geoserver/geoserver/security/advisories/GHSA-68cf-j696-wvv9) SSRF in TestWfsPost for specific targets, e.g. PHP + Nginx (High)
4242

43+
This duplication is due to CVE-2021-40822 being generated prior to our use of CVE records.
44+
4345
The use of the CVE system allows the GeoServer team to reach a wider audience than blog posts. See project [security policy](https://github.com/geoserver/geoserver/blob/main/SECURITY.md) for more information on how security vulnerabilities are managed.
4446

4547
## Demo Requests page rewritten

_posts/2024-06-18-geoserver-2-25-2-released.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ This release addresses security vulnerabilities and is considered an essential u
4040
* [CVE-2024-29198](https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw) Unauthenticated SSRF via TestWfsPost (* [CVE-2024-29198](https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw) Unauthenticated SSRF via TestWfsPost (High)
4141
[CVE-2021-40822](https://github.com/geoserver/geoserver/security/advisories/GHSA-68cf-j696-wvv9) SSRF in TestWfsPost for specific targets, e.g. PHP + Nginx (High)
4242

43+
This duplication is due to CVE-2021-40822 being generated prior to our use of CVE records.
44+
4345
The use of the CVE system allows the GeoServer team to reach a wider audience than blog posts. See the project [security policy](https://github.com/geoserver/geoserver/blob/main/SECURITY.md) for more information on how security vulnerabilities are managed.
4446

4547
## Demo Requests page rewritten

_posts/2025-04-03-geoserver-2-27-0-released.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,7 @@ This release addresses several security vulnerabilities, and is a recommended up
7878
* [CVE-2024-29198](https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw) Unauthenticated SSRF via TestWfsPost (Moderate)
7979
* [CVE-2024-40625](https://github.com/geoserver/geoserver/security/advisories/GHSA-r4hf-r8gj-jgw2) Coverage REST API Server Side Request Forgery (Moderate)
8080

81+
The use of the CVE system allows the GeoServer team to reach a wider audience than blog posts.
8182
See project [security policy](https://github.com/geoserver/geoserver/blob/main/SECURITY.md) for more information on how security vulnerabilities are managed.
8283

8384
## OGC API FeaturesService Extension

_posts/2025-05-13-geoserver-2-25-7-released.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,10 @@ Thanks to Jody Garnett and Andrea Aime (GeoSolutions) for making this release.
3030

3131
This release addresses security vulnerabilities and is considered an critical update.
3232

33-
* [CVE-2025-30145](https://github.com/geoserver/geoserver/security/advisories/GHSA-gr67-pwcv-76gf) Denial-of-service (DoS) Vulnerability in Jiffle process (High)
34-
3533
* [CVE-2025-30220](https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc) XML External Entity (XXE) Processing Vulnerability in GeoServer WFS Service (High)
3634

35+
* [CVE-2025-30145](https://github.com/geoserver/geoserver/security/advisories/GHSA-gr67-pwcv-76gf) Denial-of-service (DoS) Vulnerability in Jiffle process (High)
36+
3737
The use of the CVE system allows the GeoServer team to reach a wider audience than blog posts. See project [security policy](https://github.com/geoserver/geoserver/blob/main/SECURITY.md) for more information on how security vulnerabilities are managed.
3838

3939
## Release notes

_posts/2025-05-13-geoserver-2-27-1-released.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ This release addresses security vulnerabilities and is considered an critical up
3232

3333
* [CVE-2025-30220](https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc) XML External Entity (XXE) Processing Vulnerability in GeoServer WFS Service (High)
3434

35+
* [CVE-2025-30145](https://github.com/geoserver/geoserver/security/advisories/GHSA-gr67-pwcv-76gf) Denial-of-service (DoS) Vulnerability in Jiffle process (High)
36+
3537
See project [security policy](https://github.com/geoserver/geoserver/blob/main/SECURITY.md) for more information on how security vulnerabilities are managed.
3638

3739
## Define Coverage views using Jiffle expressions

_posts/2025-06-10-cve-disclosure.md

Lines changed: 23 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,39 +10,44 @@ categories:
1010
The GeoServer community has readied the following CVE vulnerabilities for public disclosure.
1111

1212
* [CVE-2025-30220](https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc) XML External Entity (XXE) Processing Vulnerability in GeoServer WFS Service (High)
13-
Fixed: 2.27.1 | 2.26.3 | 2.25.7
13+
Fixed:
14+
[GeoServer 2.27.1]({% post_url 2025-05-13-geoserver-2-27-1-released %}) |
15+
[GeoServer 2.26.3]({% post_url 2025-05-13-geoserver-2-26-3-released %}) |
16+
[GeoServer 2.25.7]({% post_url 2025-05-13-geoserver-2-25-7-released %})
1417

1518
* [CVE-2025-30145](https://github.com/geoserver/geoserver/security/advisories/GHSA-gr67-pwcv-76gf) Denial-of-service (DoS) Vulnerability in Jiffle process (High)
16-
Fixed: 2.27.0 | 2.26.3 | 2.25.7
19+
Fixed:
20+
[GeoServer 2.27.0]({% post_url 2025-04-03-geoserver-2-27-0-released %}) | |
21+
[GeoServer 2.26.3]({% post_url 2025-05-13-geoserver-2-26-3-released %}) |
22+
[GeoServer 2.25.7]({% post_url 2025-05-13-geoserver-2-25-7-released %})
1723

1824
* [CVE-2025-27505](https://github.com/geoserver/geoserver/security/advisories/GHSA-h86g-x8mm-78m5) Missing Authorization on REST API Index (Moderate)
19-
Fixed: 2.26.3 | 2.25.6
25+
Fixed:
26+
[GeoServer 2.26.3]({% post_url 2025-05-13-geoserver-2-26-3-released %}) |
27+
[GeoServer 2.25.6]({% post_url 2025-02-17-geoserver-2-25-6-released %})
2028

2129
* [CVE-2024-38524](https://github.com/geoserver/geoserver/security/advisories/GHSA-jm79-7xhw-6f6f) GWC Home Page exposes sensitive server information (Moderate)
22-
Fixed: 2.26.2 | 2.25.6
30+
Fixed:
31+
[GeoServer 2.26.2]({% post_url 2025-01-27-geoserver-2-26-2-released %}) |
32+
[GeoServer 2.25.6]({% post_url 2025-02-17-geoserver-2-25-6-released %})
2333

2434
* [CVE-2024-40625](https://github.com/geoserver/geoserver/security/advisories/GHSA-r4hf-r8gj-jgw2) Coverage REST API Server Side Request Forgery (Moderate)
25-
Fixed: 2.26.0
35+
Fixed:
36+
[GeoServer 2.26.0]({% post_url 2024-09-18-geoserver-2-26-0-released %})
2637

2738
* [CVE-2024-29198](https://github.com/geoserver/geoserver/security/advisories/GHSA-5gw5-jccf-6hxw) Unauthenticated SSRF via TestWfsPost (High)
2839
[CVE-2021-40822](https://github.com/geoserver/geoserver/security/advisories/GHSA-68cf-j696-wvv9) SSRF in TestWfsPost for specific targets, e.g. PHP + Nginx (High)
29-
Fixed: 2.25.2 | 2.24.4
40+
Fixed:
41+
[GeoServer 2.25.2]({% post_url 2024-06-18-geoserver-2-25-2-released %}) |
42+
[GeoServer 2.24.4]({% post_url 2024-06-18-geoserver-2-24-4-released %})
3043

3144
This duplication is due to CVE-2021-40822 being generated prior to our use of CVE records.
3245

3346
* [CVE-2024-34711](https://github.com/geoserver/geoserver/security/advisories/GHSA-mc43-4fqr-c965) Improper ENTITY_RESOLUTION_ALLOWLIST URI validation in XML Processing (SSRF) (High)
34-
Fixed: 2.25.0
35-
36-
The following release announcements have been updated:
37-
38-
* [GeoServer 2.27.1]({% post_url 2025-05-13-geoserver-2-27-1-released %})
39-
* [GeoServer 2.26.3]({% post_url 2025-05-13-geoserver-2-26-3-released %})
40-
* [GeoServer 2.26.0]({% post_url 2024-09-18-geoserver-2-26-0-released %})
41-
* [GeoServer 2.25.7]({% post_url 2025-05-13-geoserver-2-25-7-released %})
42-
* [GeoServer 2.25.6]({% post_url 2025-02-17-geoserver-2-25-6-released %})
43-
* [GeoServer 2.25.2]({% post_url 2024-06-18-geoserver-2-25-2-released %})
44-
* [GeoServer 2.24.4]({% post_url 2024-06-18-geoserver-2-24-4-released %})
45-
* [GeoServer 2.25.0]({% post_url 2024-03-19-geoserver-2-25-0-released %})
47+
Fixed:
48+
[GeoServer 2.25.0]({% post_url 2024-03-19-geoserver-2-25-0-released %})
49+
50+
The release announcements listed above have been updated.
4651

4752
Free software is a participation sport - to create a patch for a prior release volunteer with [community development](/devel/).
4853

0 commit comments

Comments
 (0)