Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PSMDB-1559 Release notes 7.0.15-9 #945

Open
wants to merge 2 commits into
base: 7.0
Choose a base branch
from

Conversation

nastena1606
Copy link
Contributor

new file: docs/release_notes/7.0.15-9.md
modified: docs/release_notes/index.md
modified: mkdocs-base.yml
modified: variables.yml

new file:   docs/release_notes/7.0.15-9.md
	modified:   docs/release_notes/index.md
	modified:   mkdocs-base.yml
	modified:   variables.yml
Copy link
Contributor

@radoslawszulgo radoslawszulgo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please also add a reference to the "upgrade to minor version" page that mention adjustments in configuration file (fork: true)


!!! important

This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9.
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malformed BSON in MongoDB.


This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9.

Users running any minor version of Percona Server for MongoDB 6.0.x before 6.0.18 and Percona Server for MongoDB 7.0.x before 7.0.15 should upgrade to Percona Server for MongoDB 6.0.18-16 and 7.0.15-9, respectively, as soon as possible.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Users running any minor version of Percona Server for MongoDB 6.0.x before 6.0.18 and Percona Server for MongoDB 7.0.x before 7.0.15 should upgrade to Percona Server for MongoDB 6.0.18-16 and 7.0.15-9, respectively, as soon as possible.
Users running any minor version of Percona Server for MongoDB 7.0.x before 7.0.15-9 should upgrade to this version as soon as possible.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants