comparison doc/CVE.txt @ 8062:28aa76443f58

fix(security): fix CVE-2024-39124, CVE-2024-39124, and CVE-2024-39125 Directions for fixing: * `CVE-2024-39124`_ - :ref:`classhelpers (_generic.help.html) are vulnerable to an XSS attack. <CVE-2024-39124>` Requires fixing tracker homes. * `CVE-2024-39125`_ - :ref:`if Referer header is set to a script tag, it will be executed. <CVE-2024-39125>` Fixed in release 2.4.0, directions available for fixing in prior versions. * `CVE-2024-39126`_ - :ref:`PDF, XML and SVG files downloaded from an issue can contain embedded JavaScript which is executed. <CVE-2024-39126>` Fixed in release 2.4.0, directions available for fixing in prior versions. prior to 2.4.0 release this weekend that fixes the last two CVE's.
author John Rouillard <rouilj@ieee.org>
date Tue, 09 Jul 2024 09:07:09 -0400
parents
children d6b447de4f59
comparison
equal deleted inserted replaced
8061:b1d384d23cdb 8062:28aa76443f58
1 .. comments:
2 This file is a temporary way to post CVE notifications before
3 a release.
4
5 Document the CVE fix info in upgrading.txt. Publishing
6 upgrading.txt would push info on the next release not the current
7 release.
8
9 So we comment out a reference anchor in upgrading.txt and use that
10 comment to extract the section from upgrading.txt into CVE.txt.
11 The extracted section gets the same anchor that is in upgrading.txt,
12 but is is not commented out.
13
14 Then we add a summary to the list of CVE's in security.txt using a
15 :ref: to the anchor. If CVE.txt is part of the build and
16 upgrading.txt has a commented out anchor, security.txt entries link
17 to CVE.html in the generated documentation.
18
19 In upgrading.txt add a
20
21 .. comment: _CVE-2024-39124:
22
23 before the section for the CVE (use the real CVE number). At the
24 end of the CVE section add an end comment:
25
26 .. comment: end of CVE include marker
27
28 Update security.txt with a :ref: to the CVE section. E.G. a
29 security.txt references look like:
30
31 * `CVE-2024-39124`_ - :ref:`classhelpers (_generic.help.html) are
32 vulnerable to an XSS attack. <CVE-2024-39124>` Requires fixing
33 tracker homes.
34
35 where <CVE-2024-39124> is the reference. The same reference anchor
36 is present (commented out) in upgrading.txt. In CVE.txt you
37 replicate the existing anchor and include to extract the content
38 section from upgrading.txt. E.G.
39
40 .. _CVE-2024-39124:
41
42 .. include:: upgrading.txt
43 :start-after: .. comment: _CVE-2024-39124:
44 :end-before: .. comment: end of CVE
45
46 After building the docs, install docs/security.html and
47 docs/CVE.html on the web site. Use the security.html URL
48 on the web site to update the CVE report.
49
50 When the release is ready, replace 'comment: _CVE' with '_CVE' in
51 upgrading.txt. This makes the anchors in upgrading.txt live.
52
53 Then disable CVE.txt by removing CVE.txt from contents.txt in the
54 toctree hidden section. Also add CVE.txt to exclude_patterns in
55 conf.py.
56
57 No change needs to happen to security.txt as it's using a :ref: and
58 we just changed the location for the ref so sphinx will get the
59 links correct.
60
61 Now build the docs and publish to the web site.
62
63 ===========
64 Roundup CVE
65 ===========
66
67 This is a list of remediation for CVE's that are not fixed in the
68 latest release. When the latest release fixes the CVE, see `the
69 upgrading doc <upgrading.html>`_ for these details.
70
71 .. contents::
72 :local:
73 :depth: 2
74
75 .. _CVE-2024-39124:
76
77 .. note::
78
79 Prior to the release of Roundup 2.4.0, you can access updated
80 tracker templates that address CVE-2024-39124 from
81 `CVE-2024-39124-templates.zip
82 <../CVE-2024-39124-templates.zip>`_. Download and extract the zip
83 file to generate a templates subdirectory containing the classic,
84 minimal and other tracker templates.
85
86 .. include:: upgrading.txt
87 :start-after: .. comment: _CVE-2024-39124:
88 :end-before: .. comment:
89
90 .. _CVE-2024-39125:
91
92 .. include:: upgrading.txt
93 :start-after: .. comment: _CVE-2024-39125:
94 :end-before: .. comment:
95
96 .. _CVE-2024-39126:
97
98 .. include:: upgrading.txt
99 :start-after: .. comment: _CVE-2024-39126:
100 :end-before: .. comment: end of CVE include marker

Roundup Issue Tracker: http://roundup-tracker.org/