Skip to content

Commit 3e8262b

Browse files
authored
Merge branch 'main' into RHIDP-4345
2 parents ef1e2c5 + 08c23f1 commit 3e8262b

10 files changed

+162
-76
lines changed

assemblies/assembly-release-notes-fixed-security-issues.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,5 @@
55
This section lists security issues fixed in {product} {product-version}.
66

77

8-
include::modules/release-notes/snip-cve---common-vulnerabilities-and-exposures-rhidp-3403.adoc[leveloffset=+1]
9-
10-
8+
include::modules/release-notes/snip-common-vulnerabilities-and-exposures.adoc[leveloffset=+1]
119

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
#!/bin/bash
2+
#
3+
# Copyright (c) 2024 Red Hat, Inc.
4+
# This program, and the accompanying materials are made
5+
# available under the terms of the Apache Public License 2.0,
6+
# available at http://www.apache.org/licenses/
7+
#
8+
# SPDX-License-Identifier: Apache-2.0
9+
10+
# Fail and stop on first error
11+
set -e
12+
destination=modules/release-notes/snip-common-vulnerabilities-and-exposures.adoc
13+
# Cleanup the destination files
14+
rm "$destination"
15+
# Send output to the destination file
16+
exec &>> "$destination"
17+
for cve in $(cat cve-list.txt)
18+
do
19+
# Start the list.
20+
echo "link:https://access.redhat.com/security/cve/$cve[$cve]::"
21+
# Call the API to return a list of details.
22+
# Red Hat is last if there is one.
23+
# Red Hat details is single line.
24+
# MITRE details are multiline.
25+
# We keep Red Hat details if present.
26+
# We keep only the first two lines on MITRE details.
27+
curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2
28+
# Add a separation
29+
echo ""
30+
done

cve-list.txt

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
CVE-2023-52439
2+
CVE-2023-52884
3+
CVE-2024-6119
4+
CVE-2024-26739
5+
CVE-2024-26929
6+
CVE-2024-26930
7+
CVE-2024-26931
8+
CVE-2024-26947
9+
CVE-2024-26991
10+
CVE-2024-27022
11+
CVE-2024-35895
12+
CVE-2024-36016
13+
CVE-2024-36899
14+
CVE-2024-38562
15+
CVE-2024-38570
16+
CVE-2024-38573
17+
CVE-2024-38601
18+
CVE-2024-38615
19+
CVE-2024-39331
20+
CVE-2024-40984
21+
CVE-2024-41071
22+
CVE-2024-42225
23+
CVE-2024-42246
24+
CVE-2024-45490
25+
CVE-2024-45491
26+
CVE-2024-45492

jira2asciidoc.yml

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -66,19 +66,6 @@ sections:
6666
AND (fixVersion ~ "{version_minor_glob}" OR fixVersion = "{version_patch}")
6767
ORDER BY key
6868
template: with-jira-link
69-
- id: fixed-security-issues
70-
title: Fixed security issues
71-
description: |
72-
This section lists security issues fixed in {product} {product-version}.
73-
query: >
74-
project = "Red Hat Internal Developer Platform"
75-
AND "Release Note Status" = "Done"
76-
AND level is EMPTY
77-
AND status in (Closed, "Release Pending")
78-
AND "Release Note Type" in ("CVE - Common Vulnerabilities and Exposures")
79-
AND (fixVersion ~ "{version_minor_glob}" OR fixVersion = "{version_patch}")
80-
ORDER BY key
81-
template: security
8269
- id: fixed-issues
8370
title: Fixed issues
8471
description: |

modules/admin/proc-rbac-config-conditional-policy-file.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ You can configure and manage conditional policies that are defined in an externa
77
* You are logged in to your {ocp-short} account using the {ocp-short} web console.
88
* You have defined roles and associated policies in a CSV file that serves as a basis for creating roles and permissions. Ensure that you mount the CSV file to {product-short}.
99
+
10-
For more information, see xref:ref-rbac-conditional-policy-definition_title-authorization[] and xref:con-rbac-config-permission-policies-external-file_title-authorization[].
10+
For more information, see xref:ref-rbac-conditional-policy-definition_title-authorization[Conditional policies definition] and xref:con-rbac-config-permission-policies-external-file_title-authorization[Configuration of permission policies defined in an external file].
1111

1212
.Procedure
1313

modules/admin/ref-rbac-rest-api-endpoints.adoc

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Returns all roles in {product-short}.
3131
----
3232
--
3333

34-
[GET] /api/permission/roles/{kind}/{namespace}/{name}::
34+
[GET] /api/permission/roles/__<kind>__/__<namespace>__/__<name>__::
3535
+
3636
--
3737
Returns information for a single role in {product-short}.
@@ -51,7 +51,7 @@ Returns information for a single role in {product-short}.
5151
----
5252
--
5353

54-
[POST] /api/permission/roles/{kind}/{namespace}/{name}::
54+
[POST] /api/permission/roles/__<kind>__/__<namespace>__/__<name>__::
5555
+
5656
--
5757
Creates a role in {product-short}.
@@ -86,7 +86,7 @@ Creates a role in {product-short}.
8686
----
8787
--
8888

89-
[PUT] /api/permission/roles/{kind}/{namespace}/{name}::
89+
[PUT] /api/permission/roles/__<kind>__/__<namespace>__/__<name>__::
9090
+
9191
--
9292
Updates `memberReferences`, `kind`, `namespace`, or `name` for a role in {product-short}.
@@ -128,7 +128,7 @@ The request body contains the `oldRole` and `newRole` objects:
128128
----
129129
--
130130

131-
[DELETE] /api/permission/roles/{kind}/{namespace}/{name}?memberReferences=<VALUE>::
131+
[DELETE] /api/permission/roles/__<kind>__/__<namespace>__/__<name>__?memberReferences=<VALUE>::
132132
+
133133
--
134134
Deletes the specified user or group from a role in {product-short}.
@@ -169,7 +169,7 @@ Deletes the specified user or group from a role in {product-short}.
169169
----
170170
--
171171

172-
[DELETE] /api/permission/roles/{kind}/{namespace}/{name}::
172+
[DELETE] /api/permission/roles/__<kind>__/__<namespace>__/__<name>__::
173173
+
174174
--
175175
Deletes a specified role from {product-short}.
@@ -207,7 +207,7 @@ Deletes a specified role from {product-short}.
207207

208208
== Permission policies
209209

210-
The RBAC REST API supports the following endpoints for managing permission policies in the {product}.
210+
The RBAC REST API supports the following endpoints for managing permission policies in the {product}.
211211

212212
[GET] /api/permission/policies::
213213
+
@@ -240,7 +240,7 @@ Returns permission policies list for all users.
240240
----
241241
--
242242

243-
[GET] /api/permission/policies/{kind}/{namespace}/{name}::
243+
[GET] /api/permission/policies/__<kind>__/__<namespace>__/__<name>__::
244244
+
245245
--
246246
Returns permission policies related to the specified entity reference.
@@ -349,7 +349,7 @@ Creates a permission policy for a specified entity.
349349
----
350350
--
351351

352-
[PUT] /api/permission/policies/{kind}/{namespace}/{name}::
352+
[PUT] /api/permission/policies/__<kind>__/__<namespace>__/__<name>__::
353353
+
354354
--
355355
Updates a permission policy for a specified entity.
@@ -417,7 +417,7 @@ The request body contains the `oldPolicy` and `newPolicy` objects:
417417
----
418418
--
419419

420-
[DELETE] /api/permission/policies/{kind}/{namespace}/{name}?permission={value1}&policy={value2}&effect={value3}::
420+
[DELETE] /api/permission/policies/__<kind>__/__<namespace>__/__<name>__?permission={value1}&policy={value2}&effect={value3}::
421421
+
422422
--
423423
Deletes a permission policy added to the specified entity.
@@ -468,7 +468,7 @@ Deletes a permission policy added to the specified entity.
468468
----
469469
--
470470

471-
[DELETE] /api/permission/policies/{kind}/{namespace}/{name}::
471+
[DELETE] /api/permission/policies/__<kind>__/__<namespace>__/__<name>__::
472472
+
473473
--
474474
Deletes all permission policies added to the specified entity.

modules/dynamic-plugins/proc-using-topology-plugin.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ p, role:default/topology-viewer, topology.view.read, read, allow grants the user
1818
1919
.Procedure
2020

21-
. Open your {product-very-hort} application and select a component from the *Catalog* page.
21+
. Open your {product-very-short} application and select a component from the *Catalog* page.
2222
. Go to the *TOPOLOGY* tab and you can view the workloads such as deployments or pods as nodes.
2323
+
2424
image::rhdh-plugins-reference/topology-tab-user1.png[topology-user-1]

modules/getting-started/proc-customize-rhdh-homepage.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ To access the Home page in {product}, the base URL must include the `/developer-
66
* JSON files hosted on GitHub or GitLab.
77
* A dedicated service that provides the Home page data in JSON format using an API.
88

9-
== Using hosted JSON files to provide data to the Learning Paths
9+
== Using hosted JSON files to provide data to the Home page
1010

1111
.Prerequisites
1212

@@ -38,7 +38,7 @@ proxy:
3838
<HEADER_KEY>: <HEADER_VALUE> # optional and can be passed as needed i.e Authorization can be passed for private GitHub repo and PRIVATE-TOKEN can be passed for private GitLab repo
3939
----
4040

41-
== Using a dedicated service to provide data to the Learning Paths
41+
== Using a dedicated service to provide data to the Home page
4242

4343
When using a dedicated service, you can do the following:
4444

Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
link:https://access.redhat.com/security/cve/CVE-2023-52439[CVE-2023-52439]::
2+
A flaw was found in the Linux kernel’s uio subsystem. A use-after-free memory flaw in the uio_open functionality allows a local user to crash or escalate their privileges on the system.
3+
4+
link:https://access.redhat.com/security/cve/CVE-2023-52884[CVE-2023-52884]::
5+
In the Linux kernel, the following vulnerability has been resolved:
6+
Input: cyapa - add missing input core locking to suspend/resume functions
7+
8+
link:https://access.redhat.com/security/cve/CVE-2024-6119[CVE-2024-6119]::
9+
A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.
10+
11+
link:https://access.redhat.com/security/cve/CVE-2024-26739[CVE-2024-26739]::
12+
A use-after-free flaw was found in net/sched/act_mirred.c in the Linux kernel. This may result in a crash.
13+
14+
link:https://access.redhat.com/security/cve/CVE-2024-26929[CVE-2024-26929]::
15+
In the Linux kernel, the following vulnerability has been resolved:
16+
scsi: qla2xxx: Fix double free of fcport
17+
18+
link:https://access.redhat.com/security/cve/CVE-2024-26930[CVE-2024-26930]::
19+
A vulnerability was found in the Linux kernel. A potential double-free in the pointer ha->vp_map exists in the Linux kernel in drivers/scsi/qla2xxx/qla_os.c.
20+
21+
link:https://access.redhat.com/security/cve/CVE-2024-26931[CVE-2024-26931]::
22+
In the Linux kernel, the following vulnerability has been resolved:
23+
scsi: qla2xxx: Fix command flush on cable pull
24+
25+
link:https://access.redhat.com/security/cve/CVE-2024-26947[CVE-2024-26947]::
26+
A flaw was found in the Linux kernel’s ARM memory management functionality, where certain memory layouts cause a kernel panic. This flaw allows an attacker who can specify or alter memory layouts to cause a denial of service.
27+
28+
link:https://access.redhat.com/security/cve/CVE-2024-26991[CVE-2024-26991]::
29+
A flaw was found in the Linux Kernel. A lpage_info overflow can occur when checking attributes. This may lead to a crash.
30+
31+
link:https://access.redhat.com/security/cve/CVE-2024-27022[CVE-2024-27022]::
32+
In the Linux kernel, the following vulnerability has been resolved:
33+
fork: defer linking file vma until vma is fully initialized
34+
35+
link:https://access.redhat.com/security/cve/CVE-2024-35895[CVE-2024-35895]::
36+
In the Linux kernel, the following vulnerability has been resolved:
37+
bpf, sockmap: Prevent lock inversion deadlock in map delete elem
38+
39+
link:https://access.redhat.com/security/cve/CVE-2024-36016[CVE-2024-36016]::
40+
In the Linux kernel, the following vulnerability has been resolved:
41+
tty: n_gsm: fix possible out-of-bounds in gsm0_receive()
42+
43+
link:https://access.redhat.com/security/cve/CVE-2024-36899[CVE-2024-36899]::
44+
In the Linux kernel, the following vulnerability has been resolved:
45+
gpiolib: cdev: Fix use after free in lineinfo_changed_notify
46+
47+
link:https://access.redhat.com/security/cve/CVE-2024-38562[CVE-2024-38562]::
48+
In the Linux kernel, the following vulnerability has been resolved:
49+
wifi: nl80211: Avoid address calculations via out of bounds array indexing
50+
51+
link:https://access.redhat.com/security/cve/CVE-2024-38570[CVE-2024-38570]::
52+
In the Linux kernel, the following vulnerability has been resolved:
53+
gfs2: Fix potential glock use-after-free on unmount
54+
55+
link:https://access.redhat.com/security/cve/CVE-2024-38573[CVE-2024-38573]::
56+
A NULL pointer dereference flaw was found in cppc_cpufreq_get_rate() in the Linux kernel. This issue may result in a crash.
57+
58+
link:https://access.redhat.com/security/cve/CVE-2024-38601[CVE-2024-38601]::
59+
In the Linux kernel, the following vulnerability has been resolved:
60+
ring-buffer: Fix a race between readers and resize checks
61+
62+
link:https://access.redhat.com/security/cve/CVE-2024-38615[CVE-2024-38615]::
63+
In the Linux kernel, the following vulnerability has been resolved:
64+
cpufreq: exit() callback is optional
65+
66+
link:https://access.redhat.com/security/cve/CVE-2024-39331[CVE-2024-39331]::
67+
A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments.
68+
69+
link:https://access.redhat.com/security/cve/CVE-2024-40984[CVE-2024-40984]::
70+
In the Linux kernel, the following vulnerability has been resolved:
71+
ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
72+
73+
link:https://access.redhat.com/security/cve/CVE-2024-41071[CVE-2024-41071]::
74+
An out-of-bounds buffer overflow has been found in the Linux kernel’s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system.
75+
76+
link:https://access.redhat.com/security/cve/CVE-2024-42225[CVE-2024-42225]::
77+
A potential flaw was found in the Linux kernel’s MediaTek WiFi, where it was reusing uninitialized data. This flaw allows a local user to gain unauthorized access to some data potentially.
78+
79+
link:https://access.redhat.com/security/cve/CVE-2024-42246[CVE-2024-42246]::
80+
In the Linux kernel, the following vulnerability has been resolved:
81+
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
82+
83+
link:https://access.redhat.com/security/cve/CVE-2024-45490[CVE-2024-45490]::
84+
A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.
85+
86+
link:https://access.redhat.com/security/cve/CVE-2024-45491[CVE-2024-45491]::
87+
An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.
88+
89+
link:https://access.redhat.com/security/cve/CVE-2024-45492[CVE-2024-45492]::
90+
A flaw was found in libexpat's internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.
91+
Lines changed: 0 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +0,0 @@
1-
link:https://access.redhat.com/security/cve/CVE-2024-37891[CVE-2024-37891]::
2-
A flaw was found in urllib3, an HTTP client library for Python. In certain configurations, urllib3 does not treat the Proxy-Authorization HTTP header as one carrying authentication material. This issue results in not stripping the header on cross-origin redirects.
3-
4-
5-
link:https://access.redhat.com/security/cve/CVE-2024-35255[CVE-2024-35255]::
6-
A flaw was found in the Azure identity library at github.com/Azure/azure-sdk-for-go/sdk/azidentity. This issue allows an elevation of privileges.
7-
8-
9-
link:https://access.redhat.com/security/cve/CVE-2024-24790[CVE-2024-24790]::
10-
A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn't behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.
11-
12-
13-
link:https://access.redhat.com/security/cve/CVE-2024-39008[CVE-2024-39008]::
14-
A flaw was found in the fast-loops Node.js package. This flaw allows an attacker to alter the behavior of all objects inheriting from the affected prototype by passing arguments to the objectMergeDeep function crafted with the built-in property: proto. This issue can potentially lead to a denial of service, remote code execution, or Cross-site scripting.
15-
16-
17-
link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]::
18-
A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input.
19-
20-
21-
link:https://access.redhat.com/security/cve/CVE-2024-24791[CVE-2024-24791]::
22-
A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.
23-
24-
25-
link:https://access.redhat.com/security/cve/CVE-2024-37891[CVE-2024-37891]::
26-
A flaw was found in urllib3, an HTTP client library for Python. In certain configurations, urllib3 does not treat the Proxy-Authorization HTTP header as one carrying authentication material. This issue results in not stripping the header on cross-origin redirects.
27-
28-
29-
link:https://access.redhat.com/security/cve/CVE-2024-41818[CVE-2024-41818]::
30-
A regular expression denial of service (ReDoS) flaw was found in fast-xml-parser in the currency.js script. By sending a specially crafted regex input, a remote attacker could cause a denial of service condition.
31-
32-
33-
link:https://access.redhat.com/security/cve/CVE-2024-39338[CVE-2024-39338]::
34-
A vulnerability was found in the Axios HTTP Client. It is vulnerable to a server-side request forgery attack (SSRF) caused by unexpected behavior where requests for path-relative URLs get processed as protocol-relative URLs. This flaw allows an attacker to perform arbitrary requests from the server, potentially accessing internal systems or exfiltrating sensitive data.
35-
36-
37-
link:https://access.redhat.com/security/cve/CVE-2024-43788[CVE-2024-43788]::
38-
A DOM Clobbering vulnerability was found in Webpack via AutoPublicPathRuntimeModule. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script through seemingly benign HTML markups in the webpage, for example, through a post or comment, and leverages the gadgets (pieces of JS code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to Cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or ID attributes.
39-
40-
41-
link:https://access.redhat.com/security/cve/CVE-2024-45590[CVE-2024-45590]::
42-
A flaw was found in body-parser. This vulnerability causes denial of service via a specially crafted payload when the URL encoding is enabled.
43-
44-
45-
link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]::
46-
A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property proto, which is recursively assigned to all the objects in the program.

0 commit comments

Comments
 (0)