Redmine 4.2.1, 4.1.3 and 4.0.9 released (security fixes)
These 3 maintenance releases are available for [[download]], you can review the changes in the [[Changelog]].
Security: these 3 releases include 4 security fixes, including a critical fix for an arbitrary file read in Git adapter, so upgrading as soon as possible is highly recommended. For those who cannot update immediately, another method to mitigate the critical risk is to update the Git version from the server to at least 2.22.0. You can get more details in [[Security Advisories]].
Many thanks to niubl from TSRC (Tencent Security Response Center) for reporting this issue to the Redmine security team, to Holger Just from www.plan.io for the hard working on these security issues and to Go Maeda who made these releases possible.
Beside this, these new versions clarify and properly fix some inconsistent permissions for issue_edit
and add_issue_notes
. Before version:“3.3.0”, users only with issue_edit
permission were allowed to add notes to issues by design, but this behaviour changed when tracker role-based permissions were added (#285) and the add_issue_notes
was explicitly required in the UI. version:4.0.8 extended this behaviour to API and version:4.0.9 to mail handler. Please check your roles settings if you have the incoming email configured.
Please note that version:4.0.9 is the last release for 4.0 series, you should upgrade to Redmine 4.1 or 4.2 to get the future maintenance updates. Next major version is version:5.0.0.
点赞0
评论
由 Just Holger 在 超过 3 年 之前添加
Thanks you to everyone who took part in this release!
As always when there are security fixes, we have updated the Redmine Security Scanner. If you haven’t already, feel free to subscribe your Redmine for regular scanning to get email updates whenever its security status changes.
由 Kadoya Hirofumi 在 超过 3 年 之前添加
thanks!
由 E Erik 在 超过 3 年 之前添加
Thanks to everyone involved!
由 Robert Vincent 在 超过 3 年 之前添加
Good work. Thank you!
由 Hartmann Fernando 在 超过 3 年 之前添加
Thanks !
由 Anonymous Anonymous 在 超过 3 年 之前添加
Does CVE-2021-31863 affect private projects? If I understand correctly, the bug can only be exploited when a user (anonymous or authenticated) has access to a specific project (correct me if I’m wrong). If all projects are private, this would mean that the only users capable of executing the exploit are authenticated users, correct?
由 Kumawat DC 在 超过 3 年 之前添加
thanks for Released Redmine 4.2.1