Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Link GHSA advisories in ChangeLog #1082

Merged
merged 1 commit into from
Oct 2, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions ChangeLog-8.php
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@
<b><?php release_date('26-Sep-2024'); ?></b>
<ul><li>CGI:
<ul>
<li>Fixed bug GHSA-p99j-rfp4-xqvq (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)</li>
<li>Fixed bug GHSA-94p6-54jq-9mwp (cgi.force_redirect configuration is bypassable due to the environment variable collision). (CVE-2024-8927)</li>
<li>Fixed bug <?php githubsecurityl('php/php-src', 'p99j-rfp4-xqvq'); ?> (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)</li>
<li>Fixed bug <?php githubsecurityl('php/php-src', '94p6-54jq-9mwp'); ?> (cgi.force_redirect configuration is bypassable due to the environment variable collision). (CVE-2024-8927)</li>
</ul></li>
<li>Core:
<ul>
Expand All @@ -41,7 +41,7 @@
</ul></li>
<li>FPM:
<ul>
<li>Fixed bug GHSA-865w-9rf3-2wh5 (Logs from childrens may be altered). (CVE-2024-9026)</li>
<li>Fixed bug <?php githubsecurityl('php/php-src', '865w-9rf3-2wh5'); ?> (Logs from childrens may be altered). (CVE-2024-9026)</li>
</ul></li>
<li>MySQLnd:
<ul>
Expand All @@ -54,7 +54,7 @@
</ul></li>
<li>SAPI:
<ul>
<li>Fixed bug GHSA-9pqp-7h25-4f32 (Erroneous parsing of multipart form data). (CVE-2024-8925)</li>
<li>Fixed bug <?php githubsecurityl('php/php-src', '9pqp-7h25-4f32'); ?> (Erroneous parsing of multipart form data). (CVE-2024-8925)</li>
</ul></li>
<li>Standard:
<ul>
Expand Down
2 changes: 2 additions & 0 deletions bin/news2html
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,8 @@ $bug_map = [
'/Implemented FR #([0-9]+)/' => '<?php implemented(\1); ?'.'>',
'/GitHub PR #([0-9]+)/' => '<?php githubissuel(\'php/php-src\', \1); ?'.'>',
'/GH-([0-9]+)/' => '<?php githubissuel(\'php/php-src\', \1); ?'.'>',
'/GHSA-([0-9a-z]{4}-[0-9a-z]{4}-[0-9a-z]{4})/'
=> '<?php githubsecurityl(\'php/php-src\', \'\1\'); ?'.'>',
];

foreach($entries as $module => $items) {
Expand Down
4 changes: 4 additions & 0 deletions include/changelogs.inc
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,10 @@ function githubissuel($repo, $number): void {
echo "<a href=\"https://github.com/$repo/issues/$number\">GH-$number</a>";
}

function githubsecurityl($repo, $id): void {
echo "<a href=\"https://github.com/$repo/security/advisories/GHSA-$id\">GHSA-$id</a>";
}

function release_date($in): void {
$time = strtotime($in);
$human_readable = date('d M Y', $time);
Expand Down
Loading