generated from redhat-developer/new-project-template
-
Notifications
You must be signed in to change notification settings - Fork 57
add RN text for 1.2.5 (RHIDP-4218) #592
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Changes from 11 commits
Commits
Show all changes
19 commits
Select commit
Hold shift + click to select a range
7cdd003
add RN text for 1.2.5
nickboldt 063264a
refactor to align with latest improvements/filenames in 1.3
nickboldt 7b12b24
indent security fixes one level lower
nickboldt 593be7b
remove CVE-2024-45590 for now, not yet done
nickboldt 93f53c3
remove CVE-2024-45590 for now, not yet done
nickboldt 478d29c
chore: uniquely version sort CVEs
nickboldt cbe198b
chore: uniquely version sort CVEs
nickboldt b45f00a
Update modules/release-notes/list-fixed-security-issues-in-product-1.…
nickboldt 62be1c9
Merge branch '1.2.x' into rn_1.2.5
nickboldt 1e2f00b
Merge branch '1.2.x' into rn_1.2.5
nickboldt ee9806f
add one more fixed CVE, update list of incomplete ones from query 'pr…
nickboldt d6da5d3
bump plugin list to latest version @janus-idp/backstage-plugin-ocm-ba…
nickboldt d27c9e1
Update modules/release-notes/list-fixed-security-issues-in-product-1.…
nickboldt 15be623
Merge branch '1.2.x' into rn_1.2.5
nickboldt 7761cbc
Update modules/release-notes/list-fixed-security-issues-in-product-1.…
nickboldt 8fc0af2
Update modules/release-notes/list-fixed-security-issues-in-product-1.…
nickboldt 2d98574
Update modules/release-notes/list-fixed-security-issues-in-product-1.…
nickboldt 716b291
regen from script
nickboldt fec1872
Update modules/release-notes/snip-fixed-security-issues-in-product-1.…
themr0c File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
14 changes: 14 additions & 0 deletions
14
modules/release-notes/list-fixed-security-issues-in-product-1.2.5.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,14 @@ | ||
| # CVE number, affected package, fixed in version(s), JIRA | ||
|
|
||
| # not yet live; uncomment to generate CVE RN text | ||
| # CVE-2024-43799,send,0.19.0,RHIDP-3946 | ||
| # CVE-2024-43800,serve-static,1.16.0,RHIDP-3932 | ||
| # CVE-2024-45590,body-parser,1.20.3,RHIDP-3916 | ||
nickboldt marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| # CVE-2024-45296,path-to-regexp,0.1.10||8.0.0,RHIDP-3897 | ||
nickboldt marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| # CVE-2004-37890,ws,8.17.1||7.5.10||6.2.3||5.2.4,RHIDP-2733 | ||
nickboldt marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
nickboldt marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| # these are live, pending the release of 1.2.5 | ||
| CVE-2024-48949,elliptic,6.5.6,RHIDP-4417 | ||
| CVE-2024-21529,dset,3.1.4,RHIDP-3925 | ||
| CVE-2024-24791,net/http,go-toolset:1.21.13-2,RHIDP-3173 | ||
| CVE-2024-39249,async,2.6.4||3.2.5,RHIDP-3146 | ||
nickboldt marked this conversation as resolved.
Show resolved
Hide resolved
nickboldt marked this conversation as resolved.
Show resolved
Hide resolved
|
||
9 changes: 9 additions & 0 deletions
9
modules/release-notes/list-fixed-security-issues-in-rpm-1.2.5.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,9 @@ | ||
| # RPM updates from Freshmaker (RHIDP-4218) | ||
| CVE-2024-37371 | ||
| CVE-2024-37370 | ||
| CVE-2024-6923 | ||
| CVE-2024-39331 | ||
| CVE-2024-45490 | ||
| CVE-2024-45491 | ||
| CVE-2024-45492 | ||
| CVE-2024-6119 |
63 changes: 63 additions & 0 deletions
63
modules/release-notes/single-source-fixed-security-issues.sh
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,63 @@ | ||
| #!/bin/bash | ||
| # | ||
| # Copyright (c) 2024 Red Hat, Inc. | ||
| # This program, and the accompanying materials are made | ||
| # available under the terms of the Apache Public License 2.0, | ||
| # available at http://www.apache.org/licenses/ | ||
| # | ||
| # SPDX-License-Identifier: Apache-2.0 | ||
|
|
||
| # Single-source the release notes Fixed security issues section from Red Hat Security Data API. | ||
| # See: https://docs.redhat.com/en/documentation/red_hat_security_data_api/1.0/html/red_hat_security_data_api/cve | ||
|
|
||
| # Fail and stop on first error | ||
| set -e | ||
|
|
||
| # get the z-stream version from the bundle-version attribute. Note that while chart-version could be larger, this is the correct value for CVE tracking | ||
| # if a different version is passed in than the value in 'product-bundle-version', generate content for that version instead | ||
| if [[ $1 ]]; then product_version="$1"; else product_version="$(grep ':product-bundle-version:' artifacts/attributes.adoc | cut -d' ' -f2 )"; fi | ||
|
|
||
| single_source_from_security_data () { | ||
| sectionname="fixed-security-issues-in-${section}-${product_version}" | ||
| dirname=$(dirname ${BASH_SOURCE}) | ||
| destination="${dirname}/snip-${sectionname}.adoc" | ||
| list="${dirname}/list-${sectionname}.txt" | ||
| list_cleaned="" | ||
| # Assert that the list file exists. | ||
| if [ ! -f ${list} ]; then | ||
| echo "ERROR: The ${list} file is missing. You must create it to proceed. For a given version, can collect the list of CVEs from a JIRA query like https://issues.redhat.com/issues/?jql=labels%3DSecurityTracking+and+project%3DRHIDP+and+fixversion%3D1.3.1 or list of Erratas from https://errata.devel.redhat.com/advisory/filters/4213" | ||
| exit 1 | ||
| fi | ||
| echo -e "= ${title}" > "$destination" | ||
| while IFS="" read -r cve || [ -n "$cve" ]; do | ||
| if [[ ${cve} != "#"* ]] && [[ $cve != "" ]]; then # skip commented and blank lines | ||
| list_cleaned="${list_cleaned}\n${cve%%,*}" # trim csv content after the CVE number | ||
| fi | ||
| done < "$list" | ||
| list_cleaned=$(echo -e "$list_cleaned" | sort -uV) | ||
| for cve in $list_cleaned; do | ||
| # Start the list. | ||
| # echo "[DEBUG] $cve ..." | ||
| echo -e "\nlink:https://access.redhat.com/security/cve/$cve[$cve]::" >> "$destination" | ||
| # Call the API to return a list of details. | ||
| # Red Hat is last if there is one. | ||
| # Red Hat details is single line. | ||
| # MITRE details are multiline. | ||
| # We keep Red Hat details if present. | ||
| # We keep only the first two lines on MITRE details. | ||
| curl -s "https://access.redhat.com/hydra/rest/securitydata/cve/$cve.json" | jq -r '.details[-1]' | head -n 2 >> "$destination" | ||
| done | ||
| # in 1.3, don't remove the 'modules/release-notes/' path prefix, just use ${destination} and use levelofset=+2 | ||
| echo "include::${destination##*release-notes/}[leveloffset=+3]" | ||
| } | ||
|
|
||
| title="{product} dependency updates" | ||
| section="product" | ||
| single_source_from_security_data | ||
|
|
||
| title="RHEL 9 platform RPM updates" | ||
| section="rpm" | ||
| single_source_from_security_data | ||
|
|
||
| # in 1.3, this moves to assemblies/assembly-release-notes-fixed-security-issues.adoc | ||
| echo "INFO: Verify that the modules/release-notes/con-relnotes-fixed-issues.adoc file contains aforementioned required include statements." |
13 changes: 13 additions & 0 deletions
13
modules/release-notes/snip-fixed-security-issues-in-product-1.2.5.adoc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,13 @@ | ||
| = {product} dependency updates | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-21529[CVE-2024-21529]:: | ||
| A flaw was found in the dset package. Affected versions of this package are vulnerable to Prototype Pollution via the dset function due to improper user input sanitization. This vulnerability allows the attacker to inject a malicious object property using the built-in Object property __proto__, which is recursively assigned to all the objects in the program. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-24791[CVE-2024-24791]:: | ||
| A flaw was found in Go. The net/http module mishandles specific server responses from HTTP/1.1 client requests. This issue may render a connection invalid and cause a denial of service. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-39249[CVE-2024-39249]:: | ||
| A flaw was found in the async Node.js package. A Regular expression Denial of Service (ReDoS) attack can potentially be triggered via the autoinject function while parsing specially crafted input. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-48949[CVE-2024-48949]:: | ||
| A flaw was found in the Elliptic package. This vulnerability allows attackers to bypass EDDSA signature validation via improper handling of signature values where the S() component of the signature is not properly checked for being non-negative or smaller than the curve order. |
25 changes: 25 additions & 0 deletions
25
modules/release-notes/snip-fixed-security-issues-in-rpm-1.2.5.adoc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,25 @@ | ||
| = RHEL 9 platform RPM updates | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-6119[CVE-2024-6119]:: | ||
| A flaw was found in OpenSSL. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-6923[CVE-2024-6923]:: | ||
| A vulnerability was found in the email module that uses Python language. The email module doesn't properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-37370[CVE-2024-37370]:: | ||
| A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-37371[CVE-2024-37371]:: | ||
| A vulnerability was found in Kerberos. This flaw is due to an issue with message token handling. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-39331[CVE-2024-39331]:: | ||
| A flaw was found in Emacs. Arbitrary shell commands can be executed without prompting when an Org mode file is opened or when the Org mode is enabled, when Emacs is used as an email client, this issue can be triggered when previewing email attachments. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-45490[CVE-2024-45490]:: | ||
| A flaw was found in libexpat's xmlparse.c component. This vulnerability allows an attacker to cause improper handling of XML data by providing a negative length value to the XML_ParseBuffer function. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-45491[CVE-2024-45491]:: | ||
| An issue was found in libexpat’s internal dtdCopy function in xmlparse.c, It can have an integer overflow for nDefaultAtts on 32-bit platforms where UINT_MAX equals SIZE_MAX. | ||
|
|
||
| link:https://access.redhat.com/security/cve/CVE-2024-45492[CVE-2024-45492]:: | ||
| A flaw was found in libexpat's internal nextScaffoldPart function in xmlparse.c. It can have an integer overflow for m_groupSize on 32-bit platforms where UINT_MAX equals SIZE_MAX. |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.