Skip to content

Commit a1be833

Browse files
list 1.2.6 fixed issues
1 parent 199cfde commit a1be833

File tree

2 files changed

+31
-2
lines changed

2 files changed

+31
-2
lines changed

artifacts/attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
:product-short: Developer Hub
1212
:product-very-short: RHDH
1313
:product-version: 1.2
14-
:product-bundle-version: 1.2.5
15-
:product-chart-version: 1.2.5
14+
:product-bundle-version: 1.2.6
15+
:product-chart-version: 1.2.6
1616
:product-backstage-version: 1.26.5
1717
:rhdeveloper-name: Red Hat Developer
1818
:rhel: Red Hat Enterprise Linux

modules/release-notes/con-relnotes-fixed-issues.adoc

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -220,6 +220,35 @@ With the release of the {product-short} 1.2.1 Helm chart, this is fixed.
220220

221221
== Fixed security issues
222222

223+
== Fixed issues in {product} 1.2.6
224+
225+
This section lists fixed issues with {product} 1.2.6:
226+
227+
Link:https://access.redhat.com/security/cve/cve-2024-37890[cve-2024-37890]
228+
A flaw was found in the Node.js WebSocket library (ws). A request with several headers exceeding the 'server.maxHeadersCount' threshold could be used to crash a ws server, leading to a denial of service.
229+
230+
//link:{LinkRHIDPIssue}RHIDP-5074[RHIDP-5074]
231+
232+
233+
Link:https://access.redhat.com/security/cve/cve-2024-43799[cve-2024-43799]
234+
235+
A flaw was found in the Send library. This vulnerability allows remote code execution via untrusted input passed to the SendStream.redirect() function.
236+
237+
//link:{LinkRHIDPIssue}RHIDP-5077[RHIDP-5077]
238+
239+
240+
Link:https://access.redhat.com/security/cve/cve-2024-43800[cve-2024-43800]
241+
A flaw was found in serve-static. This issue may allow the execution of untrusted code via passing sanitized yet untrusted user input to redirect().
242+
243+
//link:{LinkRHIDPIssue}RHIDP-5078[RHIDP-5078]
244+
245+
246+
Link: https://access.redhat.com/security/cve/cve-2024-45590[cve-2024-45590]
247+
A flaw was found in body-parser. This vulnerability causes denial of service via a specially crafted payload when the URL encoding is enabled.
248+
249+
//link:{LinkRHIDPIssue}RHIDP-5080[RHIDP-5080]
250+
251+
223252
=== Fixed security issues in {product} 1.2.5
224253

225254
include::snip-fixed-security-issues-in-product-1.2.5.adoc[leveloffset=+3]

0 commit comments

Comments
 (0)