summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTim Smith <tsmith@chef.io>2020-04-02 15:35:02 -0700
committerGitHub <noreply@github.com>2020-04-02 15:35:02 -0700
commitd1bf39c810fd04eb5f1fc16c5b9ea5c3d46043a7 (patch)
treea054d9a012f77af44323a375bdc5259760bfeca6
parentdad72b97c34b32f760b62a3d80691739b3cdfc4a (diff)
parent0244cb167b09058089861f9722b97e783e91602e (diff)
downloadchef-d1bf39c810fd04eb5f1fc16c5b9ea5c3d46043a7.tar.gz
Merge pull request #9585 from chef/more_15_notes
Add security notes for 15.9
-rw-r--r--RELEASE_NOTES.md19
1 files changed, 17 insertions, 2 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index f8f6ddd891..587f2fb2f5 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -44,6 +44,22 @@ Chef Infra Client is now tested on Ubuntu 20.04 with packages available on the [
Our Windows 10 Chef Infra Client packages now receive an additional layer of testing to ensure they function as expected.
+## Security Updates
+
+### Ruby
+
+Ruby has been updated from 2.6.5 to 2.6.6 to resolve the following CVEs:
+
+ - [CVE-2020-16255](https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/): Unsafe Object Creation Vulnerability in JSON (Additional fix)
+ - [CVE-2020-10933](https://www.ruby-lang.org/en/news/2020/03/31/heap-exposure-in-socket-cve-2020-10933/): Heap exposure vulnerability in the socket library
+
+### libarchive
+
+libarchive has been updated from 3.4.0 to 3.4.2 to resolve multiple security vulnerabilities including the following CVEs:
+
+ - [CVE-2019-19221](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19221): archive_wstring_append_from_mbs in archive_string.c has an out-of-bounds read because of an incorrect mbrtowc or mbtowc call
+ - [CVE-2020-9308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9308): archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to unpack a RAR5 file with an invalid or corrupted header
+
# Chef Infra Client 15.8
## New notify_group functionality
@@ -1217,6 +1233,7 @@ OpenSSL has been updated to 1.0.2r in order to resolve [CVE-2019-1559](https://c
### RubyGems
RubyGems has been updated to 2.7.9 in order to resolve the following CVEs:
+
- [CVE-2019-8320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320): Delete directory using symlink when decompressing tar
- [CVE-2019-8321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8321): Escape sequence injection vulnerability in verbose
- [CVE-2019-8322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322): Escape sequence injection vulnerability in gem owner
@@ -1224,8 +1241,6 @@ RubyGems has been updated to 2.7.9 in order to resolve the following CVEs:
- [CVE-2019-8324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324): Installing a malicious gem may lead to arbitrary code execution
- [CVE-2019-8325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325): Escape sequence injection vulnerability in errors
-
-
# Chef Client Release Notes 14.10:
## Updated Resources