release notes and cve doc

This commit is contained in:
Mike McLean 2024-10-04 06:54:20 -04:00
parent 6629adff0e
commit c539dfc9a6
6 changed files with 148 additions and 0 deletions

View file

@ -5,9 +5,12 @@ Release Notes
.. toctree::
:maxdepth: 1
release_notes_1.35.1
release_notes_1.35
release_notes_1.34.3
release_notes_1.34.1
release_notes_1.34
release_notes_1.33.2
release_notes_1.33.1
release_notes_1.33
release_notes_1.32.1

View file

@ -0,0 +1,34 @@
Koji 1.33.2 Release notes
=========================
This is a security update to backport the fix for :doc:`../CVEs/CVE-2024-9427`
to Koji 1.33.
Migrating from Koji 1.33.x
--------------------------
No special actions are needed to migrate from earlier 1.33 point releases.
Security Fixes
--------------
**web: XSS vulnerability**
| CVE: :doc:`../CVEs/CVE-2024-9427`
| Issue: https://pagure.io/koji/issue/4212
An unsanitized input allows for an XSS attack. Javascript code from a malicious
link could be reflected in the resulting web page. At present, we do not
believe that this can be used to submit an action or make a change in Koji due
to existing XSS protections in the code. Even so, this is a serious issue and
we recommend applying this update promptly.
Other Changes
-------------
There are no other significant changes in this release.
All changes can be found in `the roadmap <https://pagure.io/koji/roadmap/1.33.2/>`_.

View file

@ -0,0 +1,34 @@
Koji 1.34.3 Release notes
=========================
This is a security update to backport the fix for :doc:`../CVEs/CVE-2024-9427`
to Koji 1.34.
Migrating from Koji 1.34.x
--------------------------
No special actions are needed to migrate from earlier 1.34 point releases.
Security Fixes
--------------
**web: XSS vulnerability**
| CVE: :doc:`../CVEs/CVE-2024-9427`
| Issue: https://pagure.io/koji/issue/4211
An unsanitized input allows for an XSS attack. Javascript code from a malicious
link could be reflected in the resulting web page. At present, we do not
believe that this can be used to submit an action or make a change in Koji due
to existing XSS protections in the code. Even so, this is a serious issue and
we recommend applying this update promptly.
Other Changes
-------------
There are no other significant changes in this release.
All changes can be found in `the roadmap <https://pagure.io/koji/roadmap/1.34.3/>`_.

View file

@ -0,0 +1,34 @@
Koji 1.35.1 Release notes
=========================
All changes can be found in `the roadmap <https://pagure.io/koji/roadmap/1.35.1/>`_.
Most important changes are listed here.
Migrating from Koji 1.35.0
--------------------------
No special actions are needed.
Security Fixes
--------------
**web: XSS vulnerability**
| CVE: :doc:`../CVEs/CVE-2024-9427`
| Issue: https://pagure.io/koji/issue/4204
An unsanitized input allows for an XSS attack. Javascript code from a malicious
link could be reflected in the resulting web page. At present, we do not
believe that this can be used to submit an action or make a change in Koji due
to existing XSS protections in the code. Even so, this is a serious issue and
we recommend applying this update promptly.
Other Changes
-------------
There are no other significant changes in this release.
All changes can be found in `the roadmap <https://pagure.io/koji/roadmap/1.35.1/>`_.