Skip to content

Commit 13922f6

Browse files
committed
added release notes for 1.5.3 and 1.5.4
made review changes made review changes made review changes made review changes made review changes
1 parent 3eed792 commit 13922f6

File tree

4 files changed

+45
-1
lines changed

4 files changed

+45
-1
lines changed

cicd/gitops/gitops-release-notes.adoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,10 @@ include::modules/go-compatibility-and-support-matrix.adoc[leveloffset=+1]
2323
include::modules/making-open-source-more-inclusive.adoc[leveloffset=+1]
2424

2525
// Modules included, most to least recent
26+
include::modules/gitops-release-notes-1-5-4.adoc[leveloffset=+1]
27+
28+
include::modules/gitops-release-notes-1-5-3.adoc[leveloffset=+1]
29+
2630
include::modules/gitops-release-notes-1-5-2.adoc[leveloffset=+1]
2731

2832
include::modules/gitops-release-notes-1-5-1.adoc[leveloffset=+1]

modules/gitops-release-notes-1-5-1.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,4 @@ The following issues have been resolved in the current release:
1818

1919
* Before this update, an unauthenticated user was able to display error messages on the login screen while SSO was enabled. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2081689[CVE-2022-24905]
2020

21-
* Before this update, all unpatched versions of Argo CD v7.0 and later were vulnerable to a symlink-following bug. As a result, an unauthorized user with repository write access would be able to leak sensitive files from Argo CD's repo-server. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2081686[CVE-2022-24904]
21+
* Before this update, all unpatched versions of Argo CD v0.7.0 and later were vulnerable to a symlink-following bug. As a result, an unauthorized user with repository write access would be able to leak sensitive files from Argo CD's repo-server. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2081686[CVE-2022-24904]
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
// Module included in the following assembly:
2+
//
3+
// * gitops/gitops-release-notes.adoc
4+
5+
:_content-type: REFERENCE
6+
7+
[id="gitops-release-notes-1-5-3_{context}"]
8+
= Release notes for {gitops-title} 1.5.3
9+
10+
{gitops-title} 1.5.3 is now available on {product-title} 4.8, 4.9, and 4.10.
11+
12+
[id="fixed-issues-1-5-3_{context}"]
13+
== Fixed issues
14+
15+
The following issues have been resolved in the current release:
16+
17+
* Before this update, all unpatched versions of Argo CD v1.0.0 and later were vulnerable to a cross-site scripting bug. As a result, an unauthorized user would be able to inject a javascript link in the UI. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2096278[CVE-2022-31035]
18+
19+
* Before this update, all versions of Argo CD v0.11.0 and later were vulnerable to multiple attacks when SSO login was initiated from the Argo CD CLI or the UI. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2096282[CVE-2022-31034]
20+
21+
* Before this update, all unpatched versions of Argo CD v0.7 and later were vulnerable to a memory consumption bug. As a result, an unauthorized user would be able to crash the Argo CD's repo-server. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2096283[CVE-2022-31016]
22+
23+
* Before this update, all unpatched versions of Argo CD v1.3.0 and later were vulnerable to a symlink-following bug. As a result, an unauthorized user with repository write access would be able to leak sensitive YAML files from Argo CD's repo-server. This issue is now fixed. link:https://bugzilla.redhat.com/show_bug.cgi?id=2096291[CVE-2022-31036]
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
// Module included in the following assembly:
2+
//
3+
// * gitops/gitops-release-notes.adoc
4+
5+
:_content-type: REFERENCE
6+
7+
[id="gitops-release-notes-1-5-4_{context}"]
8+
= Release notes for {gitops-title} 1.5.4
9+
10+
{gitops-title} 1.5.4 is now available on {product-title} 4.8, 4.9, and 4.10.
11+
12+
[id="fixed-issues-1-5-4_{context}"]
13+
== Fixed issues
14+
15+
The following issues have been resolved in the current release:
16+
17+
* Before this update, the {gitops-title} was using an older version of the *REDIS 5* image tag. This update fixes the issue and upgrades the `rhel8/redis-5` image tag. link:https://issues.redhat.com/browse/GITOPS-2037[GITOPS-2037]

0 commit comments

Comments
 (0)