Skip to content

Commit 7cdd003

Browse files
committed
add RN text for 1.2.5
Signed-off-by: Nick Boldt <[email protected]> dedupe and add note about source of the freshmaker/RPM updates Signed-off-by: Nick Boldt <[email protected]>
1 parent 703cb20 commit 7cdd003

File tree

3 files changed

+113
-0
lines changed

3 files changed

+113
-0
lines changed
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
#!/bin/bash
2+
#
3+
# Copyright (c) 2024 Red Hat, Inc.
4+
# This program, and the accompanying materials are made
5+
# available under the terms of the Apache Public License 2.0,
6+
# available at http://www.apache.org/licenses/
7+
#
8+
# SPDX-License-Identifier: Apache-2.0
9+
10+
# Fail and stop on first error
11+
12+
if [[ $# -lt 1 ]] || [[ ! -f modules/release-notes/cve-list-$1.txt ]]; then
13+
echo "Usage:
14+
15+
To process the contents of modules/release-notes/cve-list-\$version.txt, use the appropriate file version:
16+
17+
$0 x.y.z
18+
19+
Example:
20+
21+
$0 1.2.5"
22+
exit
23+
else
24+
version="$1"
25+
fi
26+
27+
set -e
28+
destination=/tmp/snip-common-vulnerabilities-and-exposures.adoc; rm -f "$destination"
29+
30+
echo;echo "Paste the following fragment into the file modules/release-notes/con-relnotes-fixed-issues.adoc"
31+
echo; echo "----------------
32+
33+
=== Fixed security issues in {product} 1.2.5
34+
35+
This section lists fixed security issues with {product} 1.2.5:
36+
"
37+
38+
while IFS="" read -r cve || [ -n "$cve" ]
39+
do
40+
if [[ ${cve} != "#"* ]] && [[ $cve != "" ]]; then # commented or blank lines
41+
# Start the list.
42+
echo "link:https://access.redhat.com/security/cve/$cve[$cve]::"
43+
# Call the API to return a list of details.
44+
# Red Hat is last if there is one.
45+
# Red Hat details is single line.
46+
# MITRE details are multiline.
47+
# We keep Red Hat details if present.
48+
# We keep only the first two lines on MITRE details.
49+
curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2
50+
# Add a separation
51+
echo ""
52+
fi
53+
done < "modules/release-notes/cve-list-$version.txt"
54+
echo "----------------"

modules/release-notes/con-relnotes-fixed-issues.adoc

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,6 +220,46 @@ With the release of the {product-short} 1.2.1 Helm chart, this is fixed.
220220

221221
== Fixed security issues
222222

223+
=== Fixed security issues in {product} 1.2.5
224+
225+
This section lists fixed security issues with {product} 1.2.5:
226+
227+
link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]::
228+
A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program.
229+
230+
link:https://access.redhat.com/security/cve/CVE-2024-45590[CVE-2024-45590]::
231+
A flaw was found in body-parser. This vulnerability causes denial of service via a specially crafted payload when the URL encoding is enabled.
232+
233+
link:https://access.redhat.com/security/cve/CVE-2024-24791[CVE-2024-24791]::
234+
A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service.
235+
236+
link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]::
237+
A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input.
238+
239+
link:https://access.redhat.com/security/cve/CVE-2024-37371[CVE-2024-37371]::
240+
A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling.
241+
242+
link:https://access.redhat.com/security/cve/CVE-2024-37370[CVE-2024-37370]::
243+
A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling.
244+
245+
link:https://access.redhat.com/security/cve/CVE-2024-6923[CVE-2024-6923]::
246+
A vulnerability was found in the email module that uses Python language. The email module doesn't properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.
247+
248+
link:https://access.redhat.com/security/cve/CVE-2024-39331[CVE-2024-39331]::
249+
A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments.
250+
251+
link:https://access.redhat.com/security/cve/CVE-2024-45490[CVE-2024-45490]::
252+
A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function.
253+
254+
link:https://access.redhat.com/security/cve/CVE-2024-45491[CVE-2024-45491]::
255+
An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX.
256+
257+
link:https://access.redhat.com/security/cve/CVE-2024-45492[CVE-2024-45492]::
258+
A flaw was found in libexpat's internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX.
259+
260+
link:https://access.redhat.com/security/cve/CVE-2024-6119[CVE-2024-6119]::
261+
A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process.
262+
223263
=== Fixed security issues in {product} 1.2.3
224264

225265
This section lists fixed security issues with {product} 1.2.3:
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
# not yet live; uncomment to generate CVE RN text
2+
# CVE-2024-43799
3+
# CVE-2024-37890
4+
5+
# these are live, pending the release of 1.2.5
6+
CVE-2024-21529
7+
CVE-2024-45590
8+
CVE-2024-24791
9+
CVE-2024-39249
10+
11+
# RPM updates from Freshmaker (RHIDP-4218)
12+
CVE-2024-37371
13+
CVE-2024-37370
14+
CVE-2024-6923
15+
CVE-2024-39331
16+
CVE-2024-45490
17+
CVE-2024-45491
18+
CVE-2024-45492
19+
CVE-2024-6119

0 commit comments

Comments
 (0)