diff --git a/0014-resolve-dompurify-CVE.patch b/0014-resolve-dompurify-CVE.patch new file mode 100644 index 0000000000000000000000000000000000000000..450c9fdef19d028a2839dbe9d813a61dc00a3739 --- /dev/null +++ b/0014-resolve-dompurify-CVE.patch @@ -0,0 +1,58 @@ +diff --git a/package.json b/package.json +index e26f95d855a..14b3826a64d 100644 +--- a/package.json ++++ b/package.json +@@ -316,7 +316,7 @@ + "dangerously-set-html-content": "1.0.9", + "date-fns": "2.29.1", + "debounce-promise": "3.1.2", +- "dompurify": "^2.4.1", ++ "dompurify": "^2.5.0", + "emotion": "11.0.0", + "eventemitter3": "4.0.7", + "fast-deep-equal": "^3.1.3", +@@ -422,7 +422,8 @@ + "@storybook/react/webpack": "5.74.0", + "ngtemplate-loader/loader-utils": "^2.0.0", + "node-fetch": "2.6.7", +- "slate-dev-environment@^0.2.2": "patch:slate-dev-environment@npm:0.2.5#.yarn/patches/slate-dev-environment-npm-0.2.5-9aeb7da7b5.patch" ++ "slate-dev-environment@^0.2.2": "patch:slate-dev-environment@npm:0.2.5#.yarn/patches/slate-dev-environment-npm-0.2.5-9aeb7da7b5.patch", ++ "dompurify": "^2.5.0" + }, + "workspaces": { + "packages": [ +diff --git a/yarn.lock b/yarn.lock +index f374e10e333..834cfee2642 100644 +--- a/yarn.lock ++++ b/yarn.lock +@@ -18739,17 +18739,10 @@ __metadata: + languageName: node + linkType: hard + +-"dompurify@npm:^2.2.0": +- version: 2.3.8 +- resolution: "dompurify@npm:2.3.8" +- checksum: dc7b32ee57a03fe5166a850071200897cc13fa069287a709e3b2138052d73ec09a87026b9e28c8d2f254a74eaa52ef30644e98e54294c30acbca2a53f1bbc5f4 +- languageName: node +- linkType: hard +- +-"dompurify@npm:^2.4.1": +- version: 2.4.1 +- resolution: "dompurify@npm:2.4.1" +- checksum: 1169177465b3cbb25a44322937fba549f6c4e1a91b83245d144471be26619c835cccf0f8e20aa78c25ac11a06efd17cc1b9db9cacadceb78a4c08a1029eafee5 ++"dompurify@npm:^2.5.0": ++ version: 2.5.7 ++ resolution: "dompurify@npm:2.5.7" ++ checksum: 9652139743130b5ebaf5278fadec06d9b3920019b80c205565b9b8d52cd0cea90ff690c1994c5c0da5bc9d57a94dc19236cdf1ccabdc1c6cff7c255e1e597031 + languageName: node + linkType: hard + +@@ -21953,7 +21946,7 @@ __metadata: + dangerously-set-html-content: 1.0.9 + date-fns: 2.29.1 + debounce-promise: 3.1.2 +- dompurify: ^2.4.1 ++ dompurify: ^2.5.0 + emotion: 11.0.0 + enzyme: 3.11.0 + enzyme-to-json: 3.6.2 diff --git a/create_bundles.sh b/create_bundles.sh index 647ad5c8c5b5e733b234b5ce4ce37096f5a70c9c..94171aa6060a71fc5f2dc28aba7cfe08afcabf9f 100755 --- a/create_bundles.sh +++ b/create_bundles.sh @@ -40,6 +40,7 @@ awk '$2 ~ /^v/ && $4 != "indirect" {print "Provides: bundled(golang(" $1 ")) = " # Vendor Node.js dependencies patch -p1 --fuzz=0 < ../0005-remove-unused-frontend-crypto.patch +patch -p1 --fuzz=0 < ../0014-resolve-dompurify-CVE.patch export HUSKY=0 yarn install --frozen-lockfile diff --git a/create_bundles_in_container.sh b/create_bundles_in_container.sh index bbed4ca20d7d0dac4f3eff3c37b6cbdb8fc75d2e..4640068cd1f86096727a2301fc76a395f89cfaaa 100755 --- a/create_bundles_in_container.sh +++ b/create_bundles_in_container.sh @@ -6,7 +6,7 @@ # cat < 9.2.10-18.0.1 -- fix CVE-2024-24791 - -* Tue Aug 27 2024 Kaiqiang Wang 9.2.10-17.0.1 -- fix CVE-2024-24788 CVE-2024-24789 CVE-2024-24790 - -* Tue May 28 2024 Liwei Ge 9.2.10-16.0.1 +* Wed Oct 23 2024 Liwei Ge 9.2.10-20.0.1 - Use cn proxy for go build - Support loongarch build +* Thu Oct 17 2024 Sam Feifer 9.2.10-20 +- Resolves RHEL-62307: CVE-2024-47875 + +* Thu Oct 10 2024 Sam Feifer 9.2.10-19 +- Resolves RHEL-61779: CVE-2024-9355 + +* Mon Jul 22 2024 Lauren Chilton 9.2.10-18 +- Resolves RHEL-47191 + +* Wed Jun 26 2024 Sam Feifer 9.2.10-17 +- Allow for mssql datasource in selinux policy +- Resolves RHEL-43435 + * Fri Apr 5 2024 Sam Feifer 9.2.10-16 - Check OrdID is correct before deleting snapshot - fix CVE-2024-1313 diff --git a/grafana.te b/grafana.te index 498ce14868ed6c374c71de04e7a348507bc1fe59..c4d6a507660f9e0bad84e2377eeac3b2f6e015be 100644 --- a/grafana.te +++ b/grafana.te @@ -82,7 +82,7 @@ can_exec(grafana_t, grafana_pcp_exec_t) corenet_tcp_connect_all_ephemeral_ports(grafana_t) grafana_exec(grafana_t) -# Allow grafana to connect to mssql's default tcp port of 1433 +# Allow grafana to connect to mssql's default tcp port of 1433 corenet_tcp_connect_mssql_port(grafana_t) ########################################