Skip to content

Commit 2aceb84

Browse files
committed
adjust spacing
Signed-off-by: Nick Boldt <[email protected]>
1 parent d5f8663 commit 2aceb84

File tree

3 files changed

+4
-6
lines changed

3 files changed

+4
-6
lines changed

modules/release-notes/single-source-fixed-security-issues.sh

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,20 +28,18 @@ single_source_from_security_data () {
2828
echo "ERROR: The ${list} file is missing. You must create it to proceed. For a given version, can collect the list of CVEs from a JIRA query like https://issues.redhat.com/issues/?jql=labels%3DSecurityTracking+and+project%3DRHIDP+and+fixversion%3D1.3.1 or list of Erratas from https://errata.devel.redhat.com/advisory/filters/4213"
2929
exit 1
3030
fi
31-
echo "= ${title}" > "$destination"
31+
echo -e "= ${title}" > "$destination"
3232
while IFS="" read -r cve || [ -n "$cve" ]; do
3333
if [[ ${cve} != "#"* ]] && [[ $cve != "" ]]; then # skip commented and blank lines
3434
# Start the list.
35-
echo "link:https://access.redhat.com/security/cve/$cve[$cve]::" >> "$destination"
35+
echo -e "\nlink:https://access.redhat.com/security/cve/$cve[$cve]::" >> "$destination"
3636
# Call the API to return a list of details.
3737
# Red Hat is last if there is one.
3838
# Red Hat details is single line.
3939
# MITRE details are multiline.
4040
# We keep Red Hat details if present.
4141
# We keep only the first two lines on MITRE details.
4242
curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2 >> "$destination"
43-
# Add a separation
44-
echo "" >> "$destination"
4543
fi
4644
done < "$list"
4745
echo "include::${destination##*release-notes/}[leveloffset=+2]"

modules/release-notes/snip-fixed-security-issues-in-product-1.2.5.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
= {product} dependency updates
2+
23
link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]::
34
A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program.
45

@@ -10,4 +11,3 @@ A flaw was found in Go. The net/http module mishandles specific server responses
1011

1112
link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]::
1213
A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input.
13-

modules/release-notes/snip-fixed-security-issues-in-rpm-1.2.5.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
= RHEL 9 platform RPM updates
2+
23
link:https://access.redhat.com/security/cve/CVE-2024-37371[CVE-2024-37371]::
34
A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling.
45

@@ -22,4 +23,3 @@ A flaw was found in libexpat's internal nextScaffoldPart function in xmlparse.c.
2223

2324
link:https://access.redhat.com/security/cve/CVE-2024-6119[CVE-2024-6119]::
2425
A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.
25-

0 commit comments

Comments
 (0)