Skip to content

Commit

Permalink
Release 1.23.0 (#22)
Browse files Browse the repository at this point in the history
* [skip ci] Update project to latest tag verifica-firma-eidas-1.23.0

* Update pom.xml

* Update CI

* Update SNAPSHOT version

* [maven-release-plugin] prepare release verifica-firma-eidas-1.23.0

* [maven-release-plugin] prepare for next development iteration

---------

Co-authored-by: parerworker <[email protected]>
Co-authored-by: GitHub Actions <[email protected]>
  • Loading branch information
3 people authored Sep 16, 2024
1 parent 28d8a54 commit 4dfb96d
Show file tree
Hide file tree
Showing 39 changed files with 408 additions and 265 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/compile.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,4 +4,4 @@ jobs:
compile:
uses: RegioneER/parer-github-template/.github/workflows/compile.yml@v1
with:
java: '17'
java: '21'
2 changes: 1 addition & 1 deletion .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,4 @@ jobs:
uses: RegioneER/parer-github-template/.github/workflows/release.yml@v1
with:
version: ${{ inputs.version }}
java: '17'
java: '21'
5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@

## 1.23.0 (19-08-2024)

### Novità: 1
- [#33042](https://parermine.regione.emilia-romagna.it/issues/33042) Aggiornamento librerie obsolete 2024

## 1.22.1 (24-06-2024)

### Bugfix: 1
Expand Down
17 changes: 10 additions & 7 deletions CONTAINER-SCAN-REPORT.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,18 @@
## Container scan evidence CVE
<strong>Image name:</strong> registry.ente.regione.emr.it/parer/okd/verifica-firma-eidas:sast
<br/><strong>Run date:</strong> Mon Jun 24 11:42:47 CEST 2024
<br/><strong>Produced by:</strong> <a href="https://gitlab.ente.regione.emr.it/parer/okd/verifica-firma-eidas/-/jobs/274963">Job</a>
<br/><strong>CVE founded:</strong> 8
<strong>Image name:</strong>
<br/><strong>Run date:</strong> Mon Aug 19 16:34:01 CEST 2024
<br/><strong>Produced by:</strong> <a href="https://gitlab.ente.regione.emr.it/parer/okd/verifica-firma-eidas/-/jobs/330178">Job</a>
<br/><strong>CVE founded:</strong> 11
| CVE | Description | Severity | Solution |
|:---:|:---|:---:|:---|
| [CVE-2024-2961](http://www.openwall.com/lists/oss-security/2024/04/17/9)|The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.|High|Upgrade glibc to 2.28-251.el8_10.1|
| [CVE-2024-33599](https://access.redhat.com/errata/RHSA-2024:3344)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc to 2.28-251.el8_10.2|
| [CVE-2024-33599](http://www.openwall.com/lists/oss-security/2024/07/22/5)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc to 2.28-251.el8_10.2|
| [CVE-2024-2961](http://www.openwall.com/lists/oss-security/2024/04/17/9)|The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.|High|Upgrade glibc-common to 2.28-251.el8_10.1|
| [CVE-2024-33599](https://access.redhat.com/errata/RHSA-2024:3344)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc-common to 2.28-251.el8_10.2|
| [CVE-2024-33599](http://www.openwall.com/lists/oss-security/2024/07/22/5)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc-common to 2.28-251.el8_10.2|
| [CVE-2024-2961](http://www.openwall.com/lists/oss-security/2024/04/17/9)|The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.|High|Upgrade glibc-minimal-langpack to 2.28-251.el8_10.1|
| [CVE-2024-33599](https://access.redhat.com/errata/RHSA-2024:3344)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc-minimal-langpack to 2.28-251.el8_10.2|
| [CVE-2024-33599](http://www.openwall.com/lists/oss-security/2024/07/22/5)|nscd: Stack-based buffer overflow in netgroup cacheIf the Name Service Cache Daemon's (nscd) fixed size cache is exhaustedby client requests then a subsequent client request for netgroup datamay result in a stack-based buffer overflow. This flaw was introducedin glibc 2.15 when the cache was added to nscd.This vulnerability is only present in the nscd binary.|High|Upgrade glibc-minimal-langpack to 2.28-251.el8_10.2|
| [CVE-2024-21147](https://access.redhat.com/errata/RHSA-2024:4573)|Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).|High|Upgrade java-21-openjdk to 1:21.0.4.0.7-1.el8|
| [CVE-2024-21147](https://access.redhat.com/errata/RHSA-2024:4573)|Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).|High|Upgrade java-21-openjdk-devel to 1:21.0.4.0.7-1.el8|
| [CVE-2024-21147](https://access.redhat.com/errata/RHSA-2024:4573)|Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).|High|Upgrade java-21-openjdk-headless to 1:21.0.4.0.7-1.el8|
| [CVE-2023-6597](http://www.openwall.com/lists/oss-security/2024/03/20/5)|An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.|High|Upgrade platform-python to 3.6.8-62.el8_10|
| [CVE-2023-6597](http://www.openwall.com/lists/oss-security/2024/03/20/5)|An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.|High|Upgrade python3-libs to 3.6.8-62.el8_10|
6 changes: 3 additions & 3 deletions RELEASE-NOTES.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
## 1.22.1 (24-06-2024)
## 1.23.0 (19-08-2024)

### Bugfix: 1
- [#32811](https://parermine.regione.emilia-romagna.it/issues/32811) Correzione gestione "log level error" nei casi di errori "non previsti" da "gestiti in verifica firma digitale"
### Novità: 1
- [#33042](https://parermine.regione.emilia-romagna.it/issues/33042) Aggiornamento librerie obsolete 2024
32 changes: 32 additions & 0 deletions docker_build/certs/rer_ca.crt
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
41 changes: 41 additions & 0 deletions docker_build/certs/rer_ca01.crt
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
-----BEGIN CERTIFICATE-----
MIIHSjCCBTKgAwIBAgITIAAAAAQjnDHJc/zNMgAAAAAABDANBgkqhkiG9w0BAQsF
ADArMSkwJwYDVQQDEyBSZWdpb25lIEVtaWxpYS1Sb21hZ25hIFJPT1QgQ0EwMTAe
Fw0xNzA1MDgxNTIxMjdaFw0yNzA1MDgxNTMxMjdaMH4xEjAQBgoJkiaJk/IsZAEZ
FgJpdDETMBEGCgmSJomT8ixkARkWA2VtcjEXMBUGCgmSJomT8ixkARkWB3JlZ2lv
bmUxFDASBgoJkiaJk/IsZAEZFgRlbnRlMSQwIgYDVQQDExtSZWdpb25lIEVtaWxp
YS1Sb21hZ25hIENBMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCo
eIjHFymX4IXGLtSCnIYfRFV3ok0q+oq/nLi7R9QngOOsqXiWTLX83N73uha3szzE
k9ytn1W7+wab4zOP3DKD2Bx5DvMP+voK8QljahWpnOOgLPzD0bi0030cgJKGHtkZ
I/2fF25cuZ09hT4UZHb4RAjtgrpHGmhOIz+UIyP7Z+6aXiKDheSnS/YLxLu3c6GG
nBxCdJdTaXtw1jLDKmPHtgQ6ekeUhW2CDSEFB2zf6IlRSzy7o3DTXsEllMSIKhXj
X1I1NmwlHg9sqkZC9rDvmavEW007DSWSD0+XPOBx+SzWceKglrwe9jb17ZX8cTKW
w0Zrv8VenGvDwzEioOKFAgMBAAGjggMSMIIDDjAQBgkrBgEEAYI3FQEEAwIBATAj
BgkrBgEEAYI3FQIEFgQUTo2NUoDIXySFh91x8pshEISFbcUwHQYDVR0OBBYEFIpr
Wqcndg9DultgkfHAMgmtfshzMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsG
A1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFF3O4loUC2Lg
OBPDJAvjU2YUyjbbMIIBLQYDVR0fBIIBJDCCASAwggEcoIIBGKCCARSGgdxsZGFw
Oi8vL0NOPVJlZ2lvbmUlMjBFbWlsaWEtUm9tYWduYSUyMFJPT1QlMjBDQTAxLENO
PXZtNDU5c3J2LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1T
ZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUVOVEUsREM9UkVHSU9ORSxEQz1F
TVIsREM9SVQ/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENs
YXNzPWNSTERpc3RyaWJ1dGlvblBvaW50hjNodHRwOi8vY2VydGF1dGguZW50ZS5y
ZWdpb25lLmVtci5pdC9SRVJSb290Q0EwMS5jcmwwggEpBggrBgEFBQcBAQSCARsw
ggEXMIHTBggrBgEFBQcwAoaBxmxkYXA6Ly8vQ049UmVnaW9uZSUyMEVtaWxpYS1S
b21hZ25hJTIwUk9PVCUyMENBMDEsQ049QUlBLENOPVB1YmxpYyUyMEtleSUyMFNl
cnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9RU5URSxEQz1S
RUdJT05FLERDPUVNUixEQz1JVD9jQUNlcnRpZmljYXRlP2Jhc2U/b2JqZWN0Q2xh
c3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTA/BggrBgEFBQcwAoYzaHR0cDovL2Nl
cnRhdXRoLmVudGUucmVnaW9uZS5lbXIuaXQvUkVSUm9vdENBMDEuY2VyMA0GCSqG
SIb3DQEBCwUAA4ICAQC6Q9Q8iQpRAOZuoMkRkNXnxwvlB3i0QJXPxOUwate5vFPM
uWlLXepINKBj2sF70hSbnCvXbPAyNBfG/8TMrNHC8WmeUZtNKE0I0p8lQBQMu6x7
aFLFLoqzkLC++6DgwBxlFSB8/5Q03C09gEJSLJmRB7zRAmFD3GjxMcPEL+SILsfK
BRV/RtnGONRlFp/f7p6a9+A7U5srJwhJ6oWKI3KdzDvi8HtEo/6Plm1dfQSSkM5z
Z5b63ODjARmwvGwLgDJp3jrWkd9ctDQNJFXNuGWxxiyXkvT+06W6li+NRAucgMec
AiNziw5DGS0Bakow2ZC1Rw8PwIvlXSgx5zjzHlRGOWGyFtG59zaCOzvAp1a0vIhW
gvQH6LgeD0w2A5sn1POlnMibEezVuL+kLViU5bmC54L2+hzO6YSr+R5Sv52iw5bZ
Csbfn7c/2yj+Nw7i+vfEMWQ064RJR5PFGL/pZ8dmbql19mDnGu6HRgLy76TtzO5R
drTotwwsXnFQ6e8frz3FSVhWhwjMyVy/VtQNoFlSpyqIr8sa4ahcwPiGLreMxZon
UofmfknG15Y9CwJSsZvIPg0XPkDKPoJO2pENLIqm7bUCK6iWbWTl3CoChk40aj5U
NzLgLcXeJe9zqiKmPHFKVvVyp1p+I/XT06A50htVk31ylGBCVmYLpjbz5PB2eA==
-----END CERTIFICATE-----
23 changes: 23 additions & 0 deletions docker_build/certs/rer_rootca.crt
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
33 changes: 33 additions & 0 deletions docker_build/certs/rer_rootcat01.crt
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
Loading

0 comments on commit 4dfb96d

Please sign in to comment.