Skip to content

Commit 048bdd2

Browse files
committed
switch to content from 1.2.5, including support for blank/comment lines
Signed-off-by: Nick Boldt <[email protected]>
1 parent 2240409 commit 048bdd2

File tree

4 files changed

+30
-109
lines changed

4 files changed

+30
-109
lines changed

artifacts/attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
:product-short: Developer Hub
1212
:product-very-short: RHDH
1313
:product-version: 1.2
14-
:product-bundle-version: 1.2.4
15-
:product-chart-version: 1.2.4
14+
:product-bundle-version: 1.2.5
15+
:product-chart-version: 1.2.5
1616
:product-backstage-version: 1.26.5
1717
:rhdeveloper-name: Red Hat Developer
1818
:rhel: Red Hat Enterprise Linux

modules/release-notes/single-source-fixed-security-issues.sh

Lines changed: 17 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -14,43 +14,37 @@
1414
set -e
1515

1616
# get the z-stream version from the bundle-version attribute. Note that while chart-version could be larger, this is the correct value for CVE tracking
17-
product_version="$(grep ':product-bundle-version:' artifacts/attributes.adoc | cut -d' ' -f2 )"
17+
if [[ $1 ]]; then product_version="$1"; else product_version="$(grep ':product-bundle-version:' artifacts/attributes.adoc | cut -d' ' -f2 )"; fi
1818

1919
single_source_from_security_data () {
2020
sectionname="fixed-security-issues-in-${section}-${product_version}"
2121
dirname=$(dirname ${BASH_SOURCE})
2222
destination="${dirname}/snip-${sectionname}.adoc"
23+
2324
list="${dirname}/list-${sectionname}.txt"
2425
# Assert that the list file exists.
2526
if [ ! -f ${list} ]
2627
then
2728
echo "ERROR: The ${list} file is missing. You must create it to proceed. For a given version, can collect the list of CVEs from a JIRA query like https://issues.redhat.com/issues/?jql=labels%3DSecurityTracking+and+project%3DRHIDP+and+fixversion%3D1.3.1 or list of Erratas from https://errata.devel.redhat.com/advisory/filters/4213"
2829
exit 1
2930
fi
30-
# Cleanup the destination files.
31-
rm -f "$destination"
32-
# Send output to the destination file.
33-
exec 3>&1 1>> "$destination"
34-
echo "= ${title}"
35-
for cve in $(cat ${list} | sort | uniq); do
31+
echo "= ${title}" > "$destination"
32+
while IFS="" read -r cve || [ -n "$cve" ]; do
3633
if [[ ${cve} != "#"* ]] && [[ $cve != "" ]]; then # skip commented and blank lines
37-
38-
# Start the list.
39-
echo "link:https://access.redhat.com/security/cve/$cve[$cve]::"
40-
# Call the API to return a list of details.
41-
# Red Hat is last if there is one.
42-
# Red Hat details is single line.
43-
# MITRE details are multiline.
44-
# We keep Red Hat details if present.
45-
# We keep only the first two lines on MITRE details.
46-
curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2
47-
# Add a separation
48-
echo ""
49-
done
50-
# Stop sending output to the destination file
51-
exec 1>&3 3>&-
52-
echo "include::${destination}[leveloffset=+2]"
34+
# Start the list.
35+
echo "link:https://access.redhat.com/security/cve/$cve[$cve]::" >> "$destination"
36+
# Call the API to return a list of details.
37+
# Red Hat is last if there is one.
38+
# Red Hat details is single line.
39+
# MITRE details are multiline.
40+
# We keep Red Hat details if present.
41+
# We keep only the first two lines on MITRE details.
42+
curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2 >> "$destination"
43+
# Add a separation
44+
echo "" >> "$destination"
5345
fi
46+
done < "$list"
47+
echo "include::${destination##*release-notes/}[leveloffset=+2]"
5448
}
5549

5650
title="{product} dependency updates"
Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,13 @@
11
= {product} dependency updates
2-
link:https://access.redhat.com/security/cve/CVE-2024-24790[CVE-2024-24790]::
3-
A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn't behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.
2+
link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]::
3+
A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program.
4+
5+
link:https://access.redhat.com/security/cve/CVE-2024-45590[CVE-2024-45590]::
6+
A flaw was found in body-parser. This vulnerability causes denial of service via a specially crafted payload when the URL encoding is enabled.
47

58
link:https://access.redhat.com/security/cve/CVE-2024-24791[CVE-2024-24791]::
69
A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.
710

8-
link:https://access.redhat.com/security/cve/CVE-2024-35255[CVE-2024-35255]::
9-
A flaw was found in the Azure identity library at github.com/Azure/azure-sdk-for-go/sdk/azidentity. This issue allows an elevation of privileges.
10-
11-
link:https://access.redhat.com/security/cve/CVE-2024-37891[CVE-2024-37891]::
12-
A flaw was found in urllib3, an HTTP client library for Python. In certain configurations, urllib3 does not treat the `Proxy-Authorization` HTTP header as one carrying authentication material. This issue results in not stripping the header on cross-origin redirects.
13-
14-
link:https://access.redhat.com/security/cve/CVE-2024-39008[CVE-2024-39008]::
15-
A flaw was found in the fast-loops Node.js package. This flaw allows an attacker to alter the behavior of all objects inheriting from the affected prototype by passing arguments to the objectMergeDeep function crafted with the built-in property: __proto__. This issue can potentially lead to a denial of service, remote code execution, or Cross-site scripting.
16-
1711
link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]::
1812
A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input.
1913

modules/release-notes/snip-fixed-security-issues-in-rpm-1.2.5.adoc

Lines changed: 6 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -1,83 +1,16 @@
11
= RHEL 9 platform RPM updates
2-
link:https://access.redhat.com/security/cve/CVE-2023-52439[CVE-2023-52439]::
3-
A flaw was found in the Linux kernel’s uio subsystem. A use-after-free memory flaw in the uio_open functionality allows a local user to crash or escalate their privileges on the system.
2+
link:https://access.redhat.com/security/cve/CVE-2024-37371[CVE-2024-37371]::
3+
A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling.
44

5-
link:https://access.redhat.com/security/cve/CVE-2023-52884[CVE-2023-52884]::
6-
In the Linux kernel, the following vulnerability has been resolved:
7-
Input: cyapa - add missing input core locking to suspend/resume functions
5+
link:https://access.redhat.com/security/cve/CVE-2024-37370[CVE-2024-37370]::
6+
A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.
87

9-
link:https://access.redhat.com/security/cve/CVE-2024-26739[CVE-2024-26739]::
10-
A use-after-free flaw was found in net/sched/act_mirred.c in the Linux kernel. This may result in a crash.
11-
12-
link:https://access.redhat.com/security/cve/CVE-2024-26929[CVE-2024-26929]::
13-
In the Linux kernel, the following vulnerability has been resolved:
14-
scsi: qla2xxx: Fix double free of fcport
15-
16-
link:https://access.redhat.com/security/cve/CVE-2024-26930[CVE-2024-26930]::
17-
A vulnerability was found in the Linux kernel. A potential double-free in the pointer ha->vp_map exists in the Linux kernel in drivers/scsi/qla2xxx/qla_os.c.
18-
19-
link:https://access.redhat.com/security/cve/CVE-2024-26931[CVE-2024-26931]::
20-
In the Linux kernel, the following vulnerability has been resolved:
21-
scsi: qla2xxx: Fix command flush on cable pull
22-
23-
link:https://access.redhat.com/security/cve/CVE-2024-26947[CVE-2024-26947]::
24-
A flaw was found in the Linux kernel’s ARM memory management functionality, where certain memory layouts cause a kernel panic. This flaw allows an attacker who can specify or alter memory layouts to cause a denial of service.
25-
26-
link:https://access.redhat.com/security/cve/CVE-2024-26991[CVE-2024-26991]::
27-
A flaw was found in the Linux Kernel. A lpage_info overflow can occur when checking attributes. This may lead to a crash.
28-
29-
link:https://access.redhat.com/security/cve/CVE-2024-27022[CVE-2024-27022]::
30-
In the Linux kernel, the following vulnerability has been resolved:
31-
fork: defer linking file vma until vma is fully initialized
32-
33-
link:https://access.redhat.com/security/cve/CVE-2024-35895[CVE-2024-35895]::
34-
In the Linux kernel, the following vulnerability has been resolved:
35-
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
36-
37-
link:https://access.redhat.com/security/cve/CVE-2024-36016[CVE-2024-36016]::
38-
In the Linux kernel, the following vulnerability has been resolved:
39-
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
40-
41-
link:https://access.redhat.com/security/cve/CVE-2024-36899[CVE-2024-36899]::
42-
In the Linux kernel, the following vulnerability has been resolved:
43-
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
44-
45-
link:https://access.redhat.com/security/cve/CVE-2024-38562[CVE-2024-38562]::
46-
In the Linux kernel, the following vulnerability has been resolved:
47-
wifi: nl80211: Avoid address calculations via out of bounds array indexing
48-
49-
link:https://access.redhat.com/security/cve/CVE-2024-38570[CVE-2024-38570]::
50-
In the Linux kernel, the following vulnerability has been resolved:
51-
gfs2: Fix potential glock use-after-free on unmount
52-
53-
link:https://access.redhat.com/security/cve/CVE-2024-38573[CVE-2024-38573]::
54-
A NULL pointer dereference flaw was found in cppc_cpufreq_get_rate() in the Linux kernel. This issue may result in a crash.
55-
56-
link:https://access.redhat.com/security/cve/CVE-2024-38601[CVE-2024-38601]::
57-
In the Linux kernel, the following vulnerability has been resolved:
58-
ring-buffer: Fix a race between readers and resize checks
59-
60-
link:https://access.redhat.com/security/cve/CVE-2024-38615[CVE-2024-38615]::
61-
In the Linux kernel, the following vulnerability has been resolved:
62-
cpufreq: exit() callback is optional
8+
link:https://access.redhat.com/security/cve/CVE-2024-6923[CVE-2024-6923]::
9+
A vulnerability was found in the email module that uses Python language. The email module doesn't properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.
6310

6411
link:https://access.redhat.com/security/cve/CVE-2024-39331[CVE-2024-39331]::
6512
A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments.
6613

67-
link:https://access.redhat.com/security/cve/CVE-2024-40984[CVE-2024-40984]::
68-
In the Linux kernel, the following vulnerability has been resolved:
69-
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
70-
71-
link:https://access.redhat.com/security/cve/CVE-2024-41071[CVE-2024-41071]::
72-
An out-of-bounds buffer overflow has been found in the Linux kernel’s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system.
73-
74-
link:https://access.redhat.com/security/cve/CVE-2024-42225[CVE-2024-42225]::
75-
A potential flaw was found in the Linux kernel’s MediaTek WiFi, where it was reusing uninitialized data. This flaw allows a local user to gain unauthorized access to some data potentially.
76-
77-
link:https://access.redhat.com/security/cve/CVE-2024-42246[CVE-2024-42246]::
78-
In the Linux kernel, the following vulnerability has been resolved:
79-
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
80-
8114
link:https://access.redhat.com/security/cve/CVE-2024-45490[CVE-2024-45490]::
8215
A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.
8316

0 commit comments

Comments
 (0)