|
1 |
| - |
2 | 1 | // Module included in the following assemblies:
|
3 | 2 | //
|
4 | 3 | // * migration_toolkit_for_containers/mtc-release-notes.adoc
|
@@ -46,6 +45,31 @@ In this release, on migrating an application including a `BuildConfig` from a so
|
46 | 45 | In this release, after enabling `Require SSL verification` and adding content to the CA bundle file for an MCG NooBaa bucket in MigStorage, the connection fails as expected. However, when reverting these changes by removing the CA bundle content and clearing `Require SSL verification`, the connection still fails. The issue is only resolved by deleting and re-adding the repository. (link:https://bugzilla.redhat.com/show_bug.cgi?id=2240052[*BZ#2240052*])
|
47 | 46 |
|
48 | 47 |
|
| 48 | +.Backup phase fails after setting custom CA replication repository |
| 49 | + |
| 50 | +In ({mtc-short}), after editing the replication repository, adding a custom CA certificate, successfully connecting the repository, and triggering a migration, a failure occurs during the backup phase. |
| 51 | + |
| 52 | +This issue is resolved in {mtc-short} 1.8.2. |
| 53 | + |
| 54 | + |
| 55 | +.CVE-2023-26136: tough-cookie package before 4.1.3 are vulnerable to Prototype Pollution |
| 56 | + |
| 57 | +Versions before 4.1.3 of the `tough-cookie` package, used in {mtc-short}, are vulnerable to prototype pollution. This vulnerability occurs because CookieJar does not handle cookies properly when the value of the `rejectPublicSuffixes` is set to `false`. |
| 58 | + |
| 59 | +This issue is resolved in {mtc-short} 1.8.2. |
| 60 | + |
| 61 | +For more details, see link:https://access.redhat.com/security/cve/cve-2023-26136[(CVE-2023-26136)] |
| 62 | + |
| 63 | + |
| 64 | +.CVE-2022-25883 openshift-migration-ui-container: nodejs-semver: Regular expression denial of service |
| 65 | + |
| 66 | +In previous releases of ({mtc-short}), versions of the `semver` package before 7.5.2, used in {mtc-short}, are vulnerable to Regular Expression Denial of Service (ReDoS) from the function `newRange`, when untrusted user data is provided as a range. |
| 67 | + |
| 68 | +This issue is resolved in {mtc-short} 1.8.2. |
| 69 | + |
| 70 | +For more details, see link:https://access.redhat.com/security/cve/cve-2022-25883[(CVE-2022-25883)] |
| 71 | + |
| 72 | + |
49 | 73 | [id="technical-changes-1-8_{context}"]
|
50 | 74 | == Technical changes
|
51 | 75 |
|
|
0 commit comments