Skip to content

Commit d027bf5

Browse files
committed
chore: generate release notes for 1.3.1 CVEs; add optional extra metadata in the list-fixed*.txt files which we can use in other ways
Signed-off-by: Nick Boldt <[email protected]>
1 parent 7ad87aa commit d027bf5

File tree

50 files changed

+384
-286
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+384
-286
lines changed

artifacts/attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
:product-short: Developer Hub
1212
:product-very-short: RHDH
1313
:product-version: 1.3
14-
:product-bundle-version: 1.3.0
15-
:product-chart-version: 1.3.0
14+
:product-bundle-version: 1.3.1
15+
:product-chart-version: 1.3.1
1616
:product-backstage-version: 1.29.2
1717
:rhdeveloper-name: Red Hat Developer
1818
:rhel: Red Hat Enterprise Linux

assemblies/assembly-release-notes-fixed-security-issues.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,12 @@ This section lists security issues fixed in {product} {product-version}.
66

77
== {product} {product-bundle-version}
88

9+
include::./modules/release-notes/snip-fixed-security-issues-in-product-1.3.1.adoc[leveloffset=+2]
10+
11+
include::./modules/release-notes/snip-fixed-security-issues-in-rpm-1.3.1.adoc[leveloffset=+2]
12+
13+
== {product} 1.3.0
14+
915
include::modules/release-notes/snip-fixed-security-issues-in-product-1.3.0.adoc[leveloffset=+2]
1016

1117
include::modules/release-notes/snip-fixed-security-issues-in-rpm-1.3.0.adoc[leveloffset=+2]
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# CVE number, affected package, fixed in version(s), JIRA
2+
CVE-2024-21534,jsonpath-plus,10.0.0,RHIDP-4440
3+
CVE-2024-47762,@backstage/plugin-app-backend,0.3.75,RHIDP-4321
4+
CVE-2024-45816,@backstage/plugin-techdocs-backend,1.10.13,RHIDP-4116
5+
CVE-2024-37890,ws,8.17.1||7.5.10||6.2.3||5.2.4,RHIDP-2733
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
CVE-2024-34156
2+
CVE-2023-28746
3+
CVE-2024-27403
4+
CVE-2023-52658
5+
CVE-2024-35989
6+
CVE-2021-47385
7+
CVE-2024-36889
8+
CVE-2024-36978
9+
CVE-2024-38556
10+
CVE-2024-39483
11+
CVE-2024-39502
12+
CVE-2024-40959
13+
CVE-2024-42079
14+
CVE-2024-42272
15+
CVE-2024-42284

modules/release-notes/single-source-fixed-security-issues.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ single_source_from_security_data () {
3131
echo -e "= ${title}" > "$destination"
3232
while IFS="" read -r cve || [ -n "$cve" ]; do
3333
if [[ ${cve} != "#"* ]] && [[ $cve != "" ]]; then # skip commented and blank lines
34-
list_cleaned="${list_cleaned}\n${cve}"
34+
list_cleaned="${list_cleaned}\n${cve%%,*}" # trim csv content after the CVE number
3535
fi
3636
done < "$list"
3737
list_cleaned=$(echo -e "$list_cleaned" | sort -uV)

modules/release-notes/snip-bug-fix-rhidp-2139.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
[id="bug-fix-rhidp-2139"]
22
= Filtering for permissions policies that do not exist leads to an error being thrown
33

4-
Before this update, permission checks by the permission framework would throw an error if a matching permission policy was not previously defined.
5-
Therefore, {product-short} denied the request with an error.
6-
4+
Before this update, permission checks by the permission framework would throw an error if a matching permission policy was not previously defined.
5+
Therefore, {product-short} denied the request with an error.
6+
77
With this update, {product-short} denies the request without throwing an error.
88

99
.Additional resources

modules/release-notes/snip-bug-fix-rhidp-2374.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[id="bug-fix-rhidp-2374"]
22
= Added missing plugin name in the RBAC administration interface
33

4-
Before this update, the RBAC administration user interface *Permission Policies* table did not display the plugin name.
5-
4+
Before this update, the RBAC administration user interface *Permission Policies* table did not display the plugin name.
5+
66
With this update, the RBAC administration user interface *Permission Policies* table displays the plugin name.
77

88
.Additional resources

modules/release-notes/snip-bug-fix-rhidp-2412.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[id="bug-fix-rhidp-2412"]
22
= HTTP error code 431 when an user is member of many groups
33

4-
Before this update, {product-short} API became unresponsive when a user was member of a high number of groups (more than 150) with aggregated relations.
5-
Therefore, the user might have failed to authenticate.
6-
Also, {product-short} might have shown an error when opening the user entity in the UI.
7-
4+
Before this update, {product-short} API became unresponsive when a user was member of a high number of groups (more than 150) with aggregated relations.
5+
Therefore, the user might have failed to authenticate.
6+
Also, {product-short} might have shown an error when opening the user entity in the UI.
7+
88
With this update, {product-short} can handle a user member of a high number of groups (more than 150) with aggregated relations.
99

1010
.Additional resources

modules/release-notes/snip-bug-fix-rhidp-2438.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
[id="bug-fix-rhidp-2438"]
22
= OCM calls are not scoped to the OCM page
33

4-
Before this update, when the OCM plugin is installed, navigating to non-OCM pages triggered unnecessary failed OCM API calls.
5-
4+
Before this update, when the OCM plugin is installed, navigating to non-OCM pages triggered unnecessary failed OCM API calls.
5+
66
With this update, {product-short} restricts OCM API calls to OCM-related pages.
77

88
.Additional resources

modules/release-notes/snip-bug-fix-rhidp-2529.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[id="bug-fix-rhidp-2529"]
22
= When login using azure entra sso, it will use id to match the user entity, which will fail to match with user entity imported by msgraph.
33

4-
Before this update, {product-short} failed to resolve user entities with Azure authentication provider to entities ingested by the MsGraph catalog provider.
5-
Therefore, a user authentication with Microsoft Azure could not open a session in {product-short}.
6-
7-
With this update, {product-short} resolves user entities with Azure authentication provider to entities ingested by the MsGraph catalog provider.
4+
Before this update, {product-short} failed to resolve user entities with Azure authentication provider to entities ingested by the MsGraph catalog provider.
5+
Therefore, a user authentication with Microsoft Azure could not open a session in {product-short}.
6+
7+
With this update, {product-short} resolves user entities with Azure authentication provider to entities ingested by the MsGraph catalog provider.
88
Therefore, a user authentication with Microsoft Azure can open a session in {product-short}.
99

1010
.Additional resources

0 commit comments

Comments
 (0)