comparison doc/CVE.txt @ 8416:370689471a08 issue2550923_computed_property

merge from default branch accumulated changes since Nov 2023
author John Rouillard <rouilj@ieee.org>
date Sun, 17 Aug 2025 16:12:25 -0400
parents d6b447de4f59
children
comparison
equal deleted inserted replaced
7693:78585199552a 8416:370689471a08
1 .. comments:
2 This file is a temporary way to post CVE notifications before
3 a release.
4
5 Document the CVE fix info in upgrading.txt. We extract the sections
6 from upgrading.txt that deal with the CVE into a separate CVE.html.
7 An updated docs/security.html and docs/CVE.html provide the details
8 on a between release CVE announcment.
9
10 Publishing upgrading.txt would include info on the to be released
11 roundup software and wouldn't match the rest of the release docs.
12
13 To extract the info from upgrading.txt to use in CVE.html, add a
14 commented out a reference anchor in upgrading.txt. Then in CVE.txt
15 we use an include directive with start-after and end-before options
16 to exract the sections from upgrading.txt into CVE.html.
17
18 The extracted section in CVE.txt gets the same anchor that is in
19 upgrading.txt, but is is not commented out. This allows us to swap
20 out CVE.txt and uncomment the reference in upgrading.txt. Then
21 rerunning sphinx-build will make security.html point to the sections
22 in upgrading.html.
23
24 For example, in upgrading.txt add a
25
26 .. comment: _CVE-2024-39124:
27
28 before the section for the CVE (use the real CVE number). At the
29 end of the CVE section add an end comment:
30
31 .. comment: end of CVE include marker
32
33 Update security.txt with a :ref: to the CVE section. E.G. a
34 security.txt references look like:
35
36 * `CVE-2024-39124`_ - :ref:`classhelpers (_generic.help.html) are
37 vulnerable to an XSS attack. <CVE-2024-39124>` Requires fixing
38 tracker homes.
39
40 where <CVE-2024-39124> is the reference. The same reference anchor
41 is present (commented out) in upgrading.txt. In CVE.txt you
42 replicate the existing anchor and include to extract the content
43 section from upgrading.txt. E.G.
44
45 .. _CVE-2024-39124:
46
47 .. include:: upgrading.txt
48 :start-after: .. comment: _CVE-2024-39124:
49 :end-before: .. comment: end of CVE
50
51 After building the docs, install docs/security.html and
52 docs/CVE.html on the web site. Reference:
53
54 https://www.roundup-tracker.org/docs/security.html
55
56 in the CVE announcement from Mitre.
57
58 When the release is ready, replace 'comment: _CVE' with '_CVE' in
59 upgrading.txt. This makes the anchors in upgrading.txt live.
60
61 Then disable CVE.txt by removing CVE.txt from contents.txt in the
62 toctree hidden section. Also add docs/CVE.txt to exclude_patterns in
63 conf.py.
64
65 No change needs to happen to security.txt as it's using a :ref: and
66 we just changed the location for the ref so sphinx will get the
67 links correct.
68
69 Now build the docs and publish to the web site.
70
71 ===========
72 Roundup CVE
73 ===========
74
75 This is a list of remediation for CVE's that are not fixed in the
76 latest release. When the latest release fixes the CVE, see `the
77 upgrading doc <upgrading.html>`_ for these details.
78
79 .. contents::
80 :local:
81 :depth: 2
82
83 .. _CVE-2024-39124:
84
85 .. note::
86
87 Prior to the release of Roundup 2.4.0, you can access updated
88 tracker templates that address CVE-2024-39124 from
89 `CVE-2024-39124-templates.zip
90 <../CVE-2024-39124-templates.zip>`_. Download and extract the zip
91 file to generate a templates subdirectory containing the classic,
92 minimal and other tracker templates.
93
94 .. include:: upgrading.txt
95 :start-after: .. comment: _CVE-2024-39124:
96 :end-before: .. comment:
97
98 .. _CVE-2024-39125:
99
100 .. include:: upgrading.txt
101 :start-after: .. comment: _CVE-2024-39125:
102 :end-before: .. comment:
103
104 .. _CVE-2024-39126:
105
106 .. include:: upgrading.txt
107 :start-after: .. comment: _CVE-2024-39126:
108 :end-before: .. comment: end of CVE include marker

Roundup Issue Tracker: http://roundup-tracker.org/