-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PSMDB-1559 Release notes 7.0.15-9 #945
base: 7.0
Are you sure you want to change the base?
Conversation
new file: docs/release_notes/7.0.15-9.md modified: docs/release_notes/index.md modified: mkdocs-base.yml modified: variables.yml
5f6fc05
to
d838721
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please also add a reference to the "upgrade to minor version" page that mention adjustments in configuration file (fork: true)
docs/release_notes/7.0.15-9.md
Outdated
|
||
!!! important | ||
|
||
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9. | |
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malformed BSON in MongoDB. |
docs/release_notes/7.0.15-9.md
Outdated
|
||
This release of Percona Server for MongoDB includes a fix for a security vulnerability [CVE-2024-10921](https://nvd.nist.gov/vuln/detail/CVE-2024-10921). This vulnerability allowed an authorized user to trigger server crashes or receive the contents of the buffer over-reads of the server memory by sending specially crafted requests that constructed malfolmed BSON in MongoDB. The issue is fixed upstream in versions 6.0.18 and 7.0.15. The fix is also included in Percona Server for MongoDB 6.0.18-16 and 7.0.15-9. | ||
|
||
Users running any minor version of Percona Server for MongoDB 6.0.x before 6.0.18 and Percona Server for MongoDB 7.0.x before 7.0.15 should upgrade to Percona Server for MongoDB 6.0.18-16 and 7.0.15-9, respectively, as soon as possible. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Users running any minor version of Percona Server for MongoDB 6.0.x before 6.0.18 and Percona Server for MongoDB 7.0.x before 7.0.15 should upgrade to Percona Server for MongoDB 6.0.18-16 and 7.0.15-9, respectively, as soon as possible. | |
Users running any minor version of Percona Server for MongoDB 7.0.x before 7.0.15-9 should upgrade to this version as soon as possible. |
new file: docs/release_notes/7.0.15-9.md
modified: docs/release_notes/index.md
modified: mkdocs-base.yml
modified: variables.yml